Headline
CVE-2008-5983: oss-security - CVE request -
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
- Products
- Openwall GNU/*/Linux server OS
- Linux Kernel Runtime Guard
- John the Ripper password cracker
- Free & Open Source for any platform
- in the cloud
- Pro for Linux
- Pro for macOS
- Wordlists for password cracking
- passwdqc policy enforcement
- Free & Open Source for Unix
- Pro for Windows (Active Directory)
- yescrypt KDF & password hashing
- yespower Proof-of-Work (PoW)
- crypt_blowfish password hashing
- phpass ditto in PHP
- tcb better password shadowing
- Pluggable Authentication Modules
- scanlogd port scan detector
- popa3d tiny POP3 daemon
- blists web interface to mailing lists
- msulogin single user mode login
- php_mt_seed mt_rand() cracker
- Services
- Publications
- Articles
- Presentations
- Resources
- Mailing lists
- Community wiki
- Source code repositories (GitHub)
- Source code repositories (CVSweb)
- File archive & mirrors
- How to verify digital signatures
- OVE IDs
- What’s new
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Jan 2009 15:26:30 +0100 From: Jan Lieskovsky <jlieskov@…hat.com> To: “Steven M. Christey” <coley@…us.mitre.org> Cc: oss-security@…ts.openwall.com Subject: CVE request – Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)
Hello Steve,
initially CVE-2008-4863 has been assigned for the Blender’s untrusted search path issue.
Though this is a Python flaw (insertion of cwd at the beginning of the Python modules search path), according to our Python maintainers it can’t be fixed on Python’s side due the need of ensuring the work of other numerous packages, when loading Python modules.
Similar flaw, like the Blender one, has been discovered in the following packages:
1, epiphany References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363 https://bugzilla.redhat.com/show_bug.cgi?id=481548 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html (test case, mention about other affected packages, Python upstream bug rejection reasons) Debian patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=sanitize_sys.path.diff;att=1;bug=504363
2, csound References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359 https://bugzilla.redhat.com/show_bug.cgi?id=481550 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html Debian patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=1004-sanitize-sys.path.diff;att=1;bug=504359
3, dia References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251 https://bugzilla.redhat.com/show_bug.cgi?id=481551 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html Debian patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251
4, eog References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504352 https://bugzilla.redhat.com/show_bug.cgi?id=481553 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html Debian patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=02_sanitize_sys.path.patch;att=1;bug=504352
5, gedit References: https://bugzilla.redhat.com/show_bug.cgi?id=481556 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
6, xchat References: https://bugzilla.redhat.com/show_bug.cgi?id=481560 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
7, vim References: https://bugzilla.redhat.com/show_bug.cgi?id=481565 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
8, nautilus-python References: https://bugzilla.redhat.com/show_bug.cgi?id=481570 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
9, Gnumeric References: https://bugzilla.redhat.com/show_bug.cgi?id=481572 http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
Steve, could you please allocate a new CVE ids for the above issues?
Thanks, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.