Bug#513419: nautilus-python: CVE-2009-0317 untrusted search path vulnerability

Evgeni Golov sargentd at die-welt.net
Thu Jan 29 09:18:41 UTC 2009


Hey *,

On Wed, 28 Jan 2009 23:12:16 +0100 Nico Golde wrote:

> CVE-2009-0317[0]:
> | Untrusted search path vulnerability in the Python language bindings
> | for Nautilus (nautilus-python) allows local users to execute arbitrary
> | code via a Trojan horse Python file in the current working directory,
> | related to a vulnerability in the PySys_SetArgv function
> | (CVE-2008-5983).
> 
> To fix this you need to patch src/nautilus-python.c in the 
> same way as 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=CVE-2009-0318.patch;att=1;bug=513418
> should be sufficient.

Attached is a patch against current version of nautilus-python in
testing/unstable that fixes the issue.
I also attach a patch against 0.5.0 in experimental, but this one is
untested.

Regards
Evgeni

-- 
Bruce Schneier Fact Number 37:
Bruce Schneier's public and private keys are known as "Law" and "Order."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nautilus-python_CVE-2009-0317_0.5.0.patch
Type: text/x-diff
Size: 394 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.patch 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nautilus-python_CVE-2009-0317_513419.diff
Type: text/x-diff
Size: 1132 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.diff 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090129/d6bfa34a/attachment.pgp 


More information about the pkg-gnome-maintainers mailing list