Linux Security
Linux Security
Linux Security

Debian: python insecure tmp files

Date 28 Aug 2002
Posted By LinuxSecurity Advisories
A flaw in Python was discovered with an insecure use of a temporary file inos._execvpe from It uses a predictable name which could leadexecution of arbitrary code.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 159-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
August 28th, 2002              
- --------------------------------------------------------------------------

Package        : python
Vulnerability  : insecure temporary files
Problem-Type   : local
Debian-specific: no

Zack Weinberg discovered an insecure use of a temporary file in
os._execvpe from  It uses a predictable name which could lead
execution of arbitrary code.

This problem has been fixed in several versions of Python: For the
current stable distribution (woody) it has been fixed in version
1.5.2-23.1 of Python 1.5, in version 2.1.3-3.1 of Python 2.1 and in
version 2.2.1-4.1 of Python 2.2.  For the old stable distribution
(potato) this has been fixed in version 1.5.2-10potato12 for Python
1.5.  For the unstable distribution (sid) this has been fixed in
version 1.5.2-24 of Python 1.5, in version 2.1.3-6a of Python 2.1 and
in version 2.2.1-8 of Python 2.2.  Python 2.3 is not affected by this

We recommend that you upgrade your Python packages immediately.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato
- --------------------------------

  Source archives:
      Size/MD5 checksum:      814 d4368a244ae130c0a879dc583d74ebb6
      Size/MD5 checksum:    85380 cef4ee264c041385d26a6e7a914f66cf
      Size/MD5 checksum:  2533053 e9d677ae6d5a3efc6937627ed8a3e752

  Alpha architecture:
      Size/MD5 checksum:   928612 9cbc6a1fc341c7f5668da7f14ddfd336

  ARM architecture:
      Size/MD5 checksum:   848442 778e22c98169028d94ba9fe3634dd113

  Intel IA-32 architecture:
      Size/MD5 checksum:   825052 a2b34f89248287e5f61e1a9ae051b6ae

  Motorola 680x0 architecture:
      Size/MD5 checksum:   837528 550655222273b7ed3b5f19ced5bb35cc

  PowerPC architecture:
      Size/MD5 checksum:   872370 6e45dfbc1694e89f4707e1803f65943a

  Sun Sparc architecture:
      Size/MD5 checksum:   854034 3ef80fbe6213c198d713046a4405cdff

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      916 59cda94465a7108d34294050e141b0ba
      Size/MD5 checksum:   147550 0246bc4b24874e3c0f8b6c6af47b262d
      Size/MD5 checksum:  2533570 d9ade0d7613466e0353561d277ff02fe
      Size/MD5 checksum:     1283 2193a191f73cac617edc851ce1dc0874
      Size/MD5 checksum:    70192 eacc3d64dd0717ecf47fb2793a6b94c2
      Size/MD5 checksum:  6194246 1ae739aa5824de263923df3516eeaf80
      Size/MD5 checksum:     1150 029ee1aa079f8884283d57d765889d37
      Size/MD5 checksum:    91682 de92eb806eea24f0a00289a9179cce7a
      Size/MD5 checksum:  6536167 88aa07574673ccfaf35904253c78fc7d

  Alpha architecture:
      Size/MD5 checksum:   993386 157f481ea4625e923668cf5bba1c7fe6
      Size/MD5 checksum:  1804142 e02a244d71cfbe2f17c6bdf615c0d75e
      Size/MD5 checksum:  2139238 ee19156d488c1362a0035b005b2479f0

  ARM architecture:
      Size/MD5 checksum:   893284 b0f4521515c2fe08bddacea2ca58a6f1
      Size/MD5 checksum:  1646358 5d15c914dd3f0a6839357a40bd3badf7
      Size/MD5 checksum:  1952280 ec6986def88675cc6c341a10108c4b34

  Intel IA-32 architecture:
      Size/MD5 checksum:   865684 475adc23a0cd7b706dfb50bd2beb4a61
      Size/MD5 checksum:  1592036 643613afe8b24e5cc808cfa6150cd15a
      Size/MD5 checksum:  1888520 99ecda3fff482dfab2fa82b76b382161

  Intel IA-64 architecture:
      Size/MD5 checksum:  1123586 2cdb6a3542e5bfa82fc39a106723643b
      Size/MD5 checksum:  2080726 67ad0753eb9b7f55b990889f1c5eea9f
      Size/MD5 checksum:  2489592 239f5616f5a86868ba62015c689c6275

  HP Precision architecture:
      Size/MD5 checksum:   983136 caeb47a59a4b94c21b3e3bab307a6c90
      Size/MD5 checksum:  1832554 1678109725d49f26cdf20c027ce422c5
      Size/MD5 checksum:  2356270 4ac290e72d4fc1a78f7a77932941592c

  Motorola 680x0 architecture:
      Size/MD5 checksum:   880018 83124846ed4bfb1752a79bcf8294c916
      Size/MD5 checksum:  1608626 163fb049f8c148913431b10e69cdd375
      Size/MD5 checksum:  1894116 4133331c9f92c4ba241fbdf4ed96dff9

  Big endian MIPS architecture:
      Size/MD5 checksum:   893178 b47d25d678a577de7b514cab6c0f1740
      Size/MD5 checksum:  1661130 3d49c465ab6ed149e1f4edd6ef2321e1
      Size/MD5 checksum:  1952404 35602b09e79c12d25de7f72d086b644b

  Little endian MIPS architecture:
      Size/MD5 checksum:   890722 dc11adcbff392676648f0a32c5edd32c
      Size/MD5 checksum:  1657780 a47a8747ddaaf7b47a5da069c0cc52b9
      Size/MD5 checksum:  1947456 45dd211da13ae341437792454afa6f97

  PowerPC architecture:
      Size/MD5 checksum:   913346 bbfa7acdd1aa2fd2adf659d2ff6ce00b
      Size/MD5 checksum:  1681090 baad001f04c58c6da323ff6c792ba6ea
      Size/MD5 checksum:  1998924 c5de693417d368a11799adfdf16e7c44

  IBM S/390 architecture:
      Size/MD5 checksum:   897040 1586ac7fbec0d26cc32e7d63f05871ce
      Size/MD5 checksum:  1647884 0c2674c851a48a2a661a78bd8aa19ca6
      Size/MD5 checksum:  1929404 c20cbef3977c245f01ee9cf393b9b9b8

  Sun Sparc architecture:
      Size/MD5 checksum:   962856 dcdc974bf2301783ef2ab88b0062b246
      Size/MD5 checksum:  1730870 292b2edf57377e5d43c6d2c4a57db1ae
      Size/MD5 checksum:  2036542 5ff3106c8145ab392e0125f00dbff499

  Please note that python source package produces more binary packages
  than the ones listed above, which are note relevant for the fixed
  problems, though.

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"45","type":"x","order":"1","pct":80.36,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"6","type":"x","order":"2","pct":10.71,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.93,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.