This bug was fixed in the package python-dbusmock - 0.15.1-1 --------------- python-dbusmock (0.15.1-1) unstable; urgency=medium
* New upstream release. - SECURITY FIX: When loading a template from an arbitrary file through the AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() Python method, don't create or use Python's *.pyc cached files. By tricking a user into loading a template from a world-writable directory like /tmp, an attacker could run arbitrary code with the user's privileges by putting a crafted .pyc file into that directory. Note that this is highly unlikely to actually appear in practice as custom dbusmock templates are usually shipped in project directories, not directly in world-writable directories. (LP: #1453815, CVE-2015-1326) -- Martin Pitt <mp...@debian.org> Tue, 12 May 2015 12:49:53 +0200 ** Changed in: python-dbusmock (Ubuntu Wily) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1453815 Title: arbitrary code execution or file overwrite when templates are loaded from /tmp To manage notifications about this bug go to: https://bugs.launchpad.net/python-dbusmock/+bug/1453815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs