vulnerability
Red Hat OpenShift: CVE-2023-6597: python: Path traversal on tempfile.TemporaryDirectory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:H/Au:N/C:C/I:C/A:N) | Mar 19, 2024 | Jan 23, 2025 | Mar 19, 2025 |
Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:N)
Published
Mar 19, 2024
Added
Jan 23, 2025
Modified
Mar 19, 2025
Description
An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
Solution
linuxrpm-upgrade-rhcos
References
- CVE-2023-6597
- https://attackerkb.com/topics/CVE-2023-6597
- REDHAT-RHSA-2024:3347
- REDHAT-RHSA-2024:3391
- REDHAT-RHSA-2024:3466
- REDHAT-RHSA-2024:4058
- REDHAT-RHSA-2024:4077
- REDHAT-RHSA-2024:4078
- REDHAT-RHSA-2024:4166
- REDHAT-RHSA-2024:4370
- REDHAT-RHSA-2024:4406
- REDHAT-RHSA-2024:4456
- REDHAT-RHSA-2024:4865
- REDHAT-RHSA-2024:4871
- REDHAT-RHSA-2024:4896
- REDHAT-RHSA-2024:5535
- REDHAT-RHSA-2024:5689
- REDHAT-RHSA-2025:0364
- REDHAT-RHSA-2025:0646
- REDHAT-RHSA-2025:0650
- REDHAT-RHSA-2025:0832
- REDHAT-RHSA-2025:1116
- REDHAT-RHSA-2025:1120
- REDHAT-RHSA-2025:2705

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.