openbsd-ports/lang/python/2.2/patches/patch-setup_py
brad 0da69615f6 Fix security issue with Python 2.1/2.2
Zack Weinberg found a vulnerability in the way the exevpe() method
from the os.py module uses a temporary file name. A file which
supposedly should not exist is created in a unsafe way and the method
tries to execute it. The objective of such code is to discover what
error the operating system returns in a portable way.

By exploiting this vulnerability a local attacker can execute
arbitrary code with the privileges of the user running python code
which uses the execvpe() method.

http://python.org/sf/590294
http://python.org/sf/601077
2002-10-08 02:52:25 +00:00

23 lines
818 B
Plaintext

$OpenBSD: patch-setup_py,v 1.3 2002/10/08 02:52:25 brad Exp $
--- setup.py.orig Tue Mar 26 08:43:04 2002
+++ setup.py Mon Oct 7 22:19:31 2002
@@ -273,8 +273,6 @@ class PyBuildExt(build_ext):
exts.append( Extension('pwd', ['pwdmodule.c']) )
# grp(3)
exts.append( Extension('grp', ['grpmodule.c']) )
- # posix (UNIX) errno values
- exts.append( Extension('errno', ['errnomodule.c']) )
# select(2); not on ancient System V
exts.append( Extension('select', ['selectmodule.c']) )
@@ -793,7 +791,8 @@ def main():
ext_modules=[Extension('struct', ['structmodule.c'])],
# Scripts to install
- scripts = ['Tools/scripts/pydoc']
+ #scripts = ['Tools/scripts/pydoc']
+ scripts = []
)
# --install-platlib