vulnerability

Amazon Linux 2023: CVE-2023-6597: Important priority package update for python3.9 (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:N)
Published
Mar 19, 2024
Added
Feb 17, 2025
Modified
Jul 9, 2025

Description

An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
A flaw was found in the tempfile.TemporaryDirectory class in python3/cpython3. The class may dereference symbolic links during permission-related errors, resulting in users that run privileged programs being able to modify permissions of files referenced by the symbolic link.

Solutions

amazon-linux-2023-upgrade-python3amazon-linux-2023-upgrade-python3-11amazon-linux-2023-upgrade-python3-11-debugamazon-linux-2023-upgrade-python3-11-debuginfoamazon-linux-2023-upgrade-python3-11-debugsourceamazon-linux-2023-upgrade-python3-11-develamazon-linux-2023-upgrade-python3-11-idleamazon-linux-2023-upgrade-python3-11-libsamazon-linux-2023-upgrade-python3-11-testamazon-linux-2023-upgrade-python3-11-tkinteramazon-linux-2023-upgrade-python3-9-debuginfoamazon-linux-2023-upgrade-python3-9-debugsourceamazon-linux-2023-upgrade-python3-debugamazon-linux-2023-upgrade-python3-develamazon-linux-2023-upgrade-python3-idleamazon-linux-2023-upgrade-python3-libsamazon-linux-2023-upgrade-python3-testamazon-linux-2023-upgrade-python3-tkinteramazon-linux-2023-upgrade-python-unversioned-command
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.