Bug#513419: nautilus-python: CVE-2009-0317 untrusted search path vulnerability
Evgeni Golov
sargentd at die-welt.net
Thu Jan 29 09:18:41 UTC 2009
Hey *,
On Wed, 28 Jan 2009 23:12:16 +0100 Nico Golde wrote:
> CVE-2009-0317[0]:
> | Untrusted search path vulnerability in the Python language bindings
> | for Nautilus (nautilus-python) allows local users to execute arbitrary
> | code via a Trojan horse Python file in the current working directory,
> | related to a vulnerability in the PySys_SetArgv function
> | (CVE-2008-5983).
>
> To fix this you need to patch src/nautilus-python.c in the
> same way as
> http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=CVE-2009-0318.patch;att=1;bug=513418
> should be sufficient.
Attached is a patch against current version of nautilus-python in
testing/unstable that fixes the issue.
I also attach a patch against 0.5.0 in experimental, but this one is
untested.
Regards
Evgeni
--
Bruce Schneier Fact Number 37:
Bruce Schneier's public and private keys are known as "Law" and "Order."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nautilus-python_CVE-2009-0317_0.5.0.patch
Type: text/x-diff
Size: 394 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nautilus-python_CVE-2009-0317_513419.diff
Type: text/x-diff
Size: 1132 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.diff
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.pgp
More information about the pkg-gnome-maintainers
mailing list