Skip to content

Commit

Permalink
Fix CVE in docs
Browse files Browse the repository at this point in the history
  • Loading branch information
zooba authored May 7, 2024
1 parent 86da8de commit 3f5e5f5
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
4 changes: 2 additions & 2 deletions Doc/whatsnew/3.8.rst
Original file line number Diff line number Diff line change
Expand Up @@ -1049,7 +1049,7 @@ treat junctions as links.
As of 3.8.20, :func:`os.mkdir` and :func:`os.makedirs` on Windows now support
passing a *mode* value of ``0o700`` to apply access control to the new
directory. This implicitly affects :func:`tempfile.mkdtemp` and is a
mitigation for :cve:`2024-4030`. Other values for *mode* continue to be
mitigation for CVE-2024-4030. Other values for *mode* continue to be
ignored.
(Contributed by Steve Dower in :gh:`118486`.)

Expand Down Expand Up @@ -1264,7 +1264,7 @@ tempfile

As of 3.8.20 on Windows, the default mode ``0o700`` used by
:func:`tempfile.mkdtemp` now limits access to the new directory due to
changes to :func:`os.mkdir`. This is a mitigation for :cve:`2024-4030`.
changes to :func:`os.mkdir`. This is a mitigation for CVE-2024-4030.
(Contributed by Steve Dower in :gh:`118486`.)


Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
:func:`os.mkdir` on Windows now accepts *mode* of ``0o700`` to restrict
the new directory to the current user. This fixes :cve:`2024-4030`
the new directory to the current user. This fixes CVE-2024-4030
affecting :func:`tempfile.mkdtemp` in scenarios where the base temporary
directory is more permissive than the default.

0 comments on commit 3f5e5f5

Please sign in to comment.