CVE-2014-2667
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
16/11/2014
Last modified:
12/04/2025
Description
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
Impact
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.python.org/issue21082
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://www.openwall.com/lists/oss-security/2014/03/28/15
- http://www.openwall.com/lists/oss-security/2014/03/29/5
- http://www.openwall.com/lists/oss-security/2014/03/30/4
- https://security.gentoo.org/glsa/201503-10
- http://bugs.python.org/issue21082
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://www.openwall.com/lists/oss-security/2014/03/28/15
- http://www.openwall.com/lists/oss-security/2014/03/29/5
- http://www.openwall.com/lists/oss-security/2014/03/30/4
- https://security.gentoo.org/glsa/201503-10



