GLSA: python

From: Daniel Ahlberg (alizat_private)
Date: Thu Oct 03 2002 - 07:44:39 PDT

  • Next message: EnGarde Secure Linux: "[ESA-20021003-023] fetchmail-ssl: buffer overflows and broken boundary checks."

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT
    - - --------------------------------------------------------------------
    
    PACKAGE        :python
    SUMMARY        :os.execvpe() vulnerability
    DATE           :2002-10-03 14:45 UTC
    
    - - --------------------------------------------------------------------
    
    OVERVIEW
    
    By exploiting this vulnerability a local attacker can execute
    arbitrary code with the privileges of the user running python code
    which uses the execvpe() method.
    
    DETAIL
    
    Zack Weinberg found a vulnerability in the way the exevpe() method
    from the os.py module uses a temporary file name. A file which
    supposedly should not exist is created in a unsafe way and the method
    tries to execute it. The objective of such code is to discover what
    error the operating system returns in a portable way.
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    dev-lang/python-2.2.1-r4 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge python
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9nFfWfT7nyhUpoZMRAlRIAKChIVtWL75kMwXlt0Ifk5s5seczkgCgiaKZ
    t1mU5Nim159c3J9y9dyjELs=
    =80ty
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Oct 03 2002 - 16:14:02 PDT