CVE-2008-5983
Publication date 27 January 2009
Last updated 24 July 2024
Ubuntu priority
Description
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| python2.4 | ||
| python2.5 | ||
| python2.6 | ||
| python2.7 | ||
| python3.1 | ||
| python3.2 | ||
Notes
jdstrand
upstream added new C API function, PySys_SetArgvEx, which can be used to set sys.argv without also modifying sys.path. The default behavior for PySys_SetArgv does not change.
Patch details
| Package | Patch details | 
|---|---|
| python2.6 | |
| python3.1 | 
References
Related Ubuntu Security Notices (USN)
- USN-1613-1
 - Python 2.5 vulnerabilities
 - 17 October 2012
 - USN-1613-2
 - Python 2.4 vulnerabilities
 - 17 October 2012
 - USN-1616-1
 - Python 3.1 vulnerabilities
 - 24 October 2012
 - USN-1596-1
 - Python 2.6 vulnerabilities
 - 4 October 2012