This bug was fixed in the package python-dbusmock - 0.15.1-1

---------------
python-dbusmock (0.15.1-1) unstable; urgency=medium

  * New upstream release.
    - SECURITY FIX: When loading a template from an arbitrary file through the
      AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template()
      Python method, don't create or use Python's *.pyc cached files. By
      tricking a user into loading a template from a world-writable directory
      like /tmp, an attacker could run arbitrary code with the user's
      privileges by putting a crafted .pyc file into that directory.

      Note that this is highly unlikely to actually appear in practice as custom
      dbusmock templates are usually shipped in project directories, not
      directly in world-writable directories.
      (LP: #1453815, CVE-2015-1326)

 -- Martin Pitt <mp...@debian.org>  Tue, 12 May 2015 12:49:53 +0200

** Changed in: python-dbusmock (Ubuntu Wily)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1453815

Title:
  arbitrary code execution or file overwrite when templates are loaded
  from /tmp

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-dbusmock/+bug/1453815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to