0da69615f6
Zack Weinberg found a vulnerability in the way the exevpe() method from the os.py module uses a temporary file name. A file which supposedly should not exist is created in a unsafe way and the method tries to execute it. The objective of such code is to discover what error the operating system returns in a portable way. By exploiting this vulnerability a local attacker can execute arbitrary code with the privileges of the user running python code which uses the execvpe() method. http://python.org/sf/590294 http://python.org/sf/601077
23 lines
818 B
Plaintext
23 lines
818 B
Plaintext
$OpenBSD: patch-setup_py,v 1.3 2002/10/08 02:52:25 brad Exp $
|
|
--- setup.py.orig Tue Mar 26 08:43:04 2002
|
|
+++ setup.py Mon Oct 7 22:19:31 2002
|
|
@@ -273,8 +273,6 @@ class PyBuildExt(build_ext):
|
|
exts.append( Extension('pwd', ['pwdmodule.c']) )
|
|
# grp(3)
|
|
exts.append( Extension('grp', ['grpmodule.c']) )
|
|
- # posix (UNIX) errno values
|
|
- exts.append( Extension('errno', ['errnomodule.c']) )
|
|
# select(2); not on ancient System V
|
|
exts.append( Extension('select', ['selectmodule.c']) )
|
|
|
|
@@ -793,7 +791,8 @@ def main():
|
|
ext_modules=[Extension('struct', ['structmodule.c'])],
|
|
|
|
# Scripts to install
|
|
- scripts = ['Tools/scripts/pydoc']
|
|
+ #scripts = ['Tools/scripts/pydoc']
|
|
+ scripts = []
|
|
)
|
|
|
|
# --install-platlib
|