CVE-2008-5983
Publication date 27 January 2009
Last updated 24 July 2024
Ubuntu priority
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Status
Package | Ubuntu Release | Status |
---|---|---|
python2.4 | ||
python2.5 | ||
python2.6 | ||
python2.7 | ||
python3.1 | ||
python3.2 | ||
Notes
jdstrand
upstream added new C API function, PySys_SetArgvEx, which can be used to set sys.argv without also modifying sys.path. The default behavior for PySys_SetArgv does not change.
Patch details
Package | Patch details |
---|---|
python2.6 | |
python3.1 |
References
Related Ubuntu Security Notices (USN)
- USN-1613-1
- Python 2.5 vulnerabilities
- 17 October 2012
- USN-1613-2
- Python 2.4 vulnerabilities
- 17 October 2012
- USN-1616-1
- Python 3.1 vulnerabilities
- 24 October 2012
- USN-1596-1
- Python 2.6 vulnerabilities
- 4 October 2012