Source: python-filelock
Version: 3.20.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/tox-dev/filelock/pull/461
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-filelock.

CVE-2025-68146[0]:
| filelock is a platform-independent file lock for Python. In versions
| prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition
| allows local attackers to corrupt or truncate arbitrary user files
| through symlink attacks. The vulnerability exists in both Unix and
| Windows lock file creation where filelock checks if a file exists
| before opening it with O_TRUNC. An attacker can create a symlink
| pointing to a victim file in the time gap between the check and
| open, causing os.open() to follow the symlink and truncate the
| target file. All users of filelock on Unix, Linux, macOS, and
| Windows systems are impacted. The vulnerability cascades to
| dependent libraries. The attack requires local filesystem access and
| ability to create symlinks (standard user permissions on Unix;
| Developer Mode on Windows 10+). Exploitation succeeds within 1-3
| attempts when lock file paths are predictable. The issue is fixed in
| version 3.20.1. If immediate upgrade is not possible, use
| SoftFileLock instead of UnixFileLock/WindowsFileLock (note:
| different locking semantics, may not be suitable for all use cases);
| ensure lock file directories have restrictive permissions (chmod
| 0700) to prevent untrusted users from creating symlinks; and/or
| monitor lock file directories for suspicious symlinks before running
| trusted applications. These workarounds provide only partial
| mitigation. The race condition remains exploitable. Upgrading to
| version 3.20.1 is strongly recommended.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-68146
    https://www.cve.org/CVERecord?id=CVE-2025-68146
[1] https://github.com/tox-dev/filelock/pull/461
[2] https://github.com/tox-dev/filelock/security/advisories/GHSA-w853-jp5j-5j7f
[3] 
https://github.com/tox-dev/filelock/commit/4724d7f8c3393ec1f048c93933e6e3e6ec321f0e

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to