0da69615f6
Zack Weinberg found a vulnerability in the way the exevpe() method from the os.py module uses a temporary file name. A file which supposedly should not exist is created in a unsafe way and the method tries to execute it. The objective of such code is to discover what error the operating system returns in a portable way. By exploiting this vulnerability a local attacker can execute arbitrary code with the privileges of the user running python code which uses the execvpe() method. http://python.org/sf/590294 http://python.org/sf/601077
9 lines
131 B
Makefile
9 lines
131 B
Makefile
# $OpenBSD: Makefile,v 1.3 2002/10/08 02:52:25 brad Exp $
|
|
|
|
VERSION= 2.2
|
|
PATCHLEVEL= .1
|
|
PKG_PATCHLEVEL= p1
|
|
|
|
.include <bsd.port.mk>
|
|
|