Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-6507
HistoryDec 08, 2023 - 12:00 a.m.

CVE-2023-6507

2023-12-0800:00:00
ubuntu.com
ubuntu.com
23
cpython
subprocess module
posix platforms
privilege escalation
extra_groups parameter
setgroups system call
cve-2023-6507
privilege

CVSS3

6.1

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

25.6%

An issue was found in CPython 3.12.0 subprocess module on POSIX
platforms. The issue was fixed in CPython 3.12.1 and does not affect other
stable releases. When using the extra_groups= parameter with an empty
list as a value (ie extra_groups=[]) the logic regressed to not call
setgroups(0, NULL) before calling exec(), thus not dropping the
original processes’ groups before starting the new process. There is no
issue when the parameter isn’t used or when any value is used besides an
empty list. This issue only impacts CPython processes run with sufficient
privilege to make the setgroups system call (typically root).

Bugs

Notes

Author Note
mdeslaur only affects 3.12.0, no earlier releases
OSVersionArchitecturePackageVersionFilename
ubuntu23.10noarchpython3.12< 3.12.0-1ubuntu0.1UNKNOWN

CVSS3

6.1

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

25.6%