Title | Github buzz 1.1.0 Insecure Temporary File in chidiwilliams / buzz |
---|
Description | Chidivilliams/buzz uses the unsafe deprecated function tempfile. mktem() in number of files
This is very unsafe because during the time between calling mktemp() and the first process attempting to create a file, different processes may create a file with this name.
Functions that create temporary file names (such as tempfile.mktemp()) are fundamentally insecure, as they do not ensure exclusive access to a file with the temporary name they return. The file name returned by these functions is guaranteed to be unique on creation but the file must be opened in a separate operation. There is no guarantee that the creation and open operations will happen atomically. This provides an opportunity for an attacker to interfere with the file before it is opened.
Use mkstemp() instead of tempfile.mktemp(). |
---|
Source | ⚠️ https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md |
---|
User | startr4ck (UID 76213) |
---|
Submission | 10/17/2024 08:14 AM (2 months ago) |
---|
Moderation | 10/24/2024 09:51 PM (8 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 281764 [chidiwilliams buzz 1.1.0 buzz/model_loader.py download_model temp file] |
---|
Points | 20 |
---|