First published: Tue May 07 2024(Updated: )
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
Credit: cna@python.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | = |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4030 has not been assigned a severity score yet, but it poses a risk due to improper permissions on temporary directories.
To fix CVE-2024-4030, update your Python installation to the latest version that includes the security patch.
CVE-2024-4030 affects Windows systems running affected versions of Python.
The potential impacts of CVE-2024-4030 include unauthorized access to temporary files created by Python applications.
CVE-2024-4030 was disclosed in 2024, though specific discovery dates may vary depending on reports.