Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 506084 (CVE-2014-2667) - <dev-lang/python-{2.7.7,3.2.5-r5,3.3.5-r1}: "os._get_masked_mode()" Race Condition Security Issue (CVE-2014-2667)
Summary: <dev-lang/python-{2.7.7,3.2.5-r5,3.3.5-r1}: "os._get_masked_mode()" Race Cond...
Status: RESOLVED FIXED
Alias: CVE-2014-2667
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/57672/
Whiteboard: A4 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-28 15:07 UTC by Agostino Sarubbo
Modified: 2015-03-18 22:36 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-28 15:07:29 UTC
From ${URL} :

Description

A security issue has been reported in Python, which can be exploited by malicious, local users to 
potentially disclose or manipulate certain data.

The security issue is caused due to a race condition within the "os._get_masked_mode()" function 
(Lib/os.py), which can be exploited to cause certain application-created files to be world-accessible.

The security issue is reported in versions 3.4, 3.3, and 3.2.


Solution:
No official solution is currently available.

Provided and/or discovered by:
Ryan Lortie within a bug ticket

Original Advisory:
Ryan Lortie:
http://bugs.python.org/issue21082


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-12-29 00:00:02 UTC
CVE-2014-2667 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2667):
  Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2
  through 3.5, when exist_ok is set to true and multiple threads are used,
  might allow local users to bypass intended file permissions by leveraging a
  separate application vulnerability before the umask has been set to the
  expected value.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2015-03-18 22:36:11 UTC
This issue was resolved and addressed in
 GLSA 201503-10 at https://security.gentoo.org/glsa/201503-10
by GLSA coordinator Kristian Fiskerstrand (K_F).