* SECURITY FIX: When loading a template from an arbitrary file through the
AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template()
Python method, don't create or use Python's *.pyc cached files. By
tricking a user into loading a template from a world-writable directory
like /tmp, an attacker could run arbitrary code with the user's
privileges by putting a crafted .pyc file into that directory.
Note that this is highly unlikely to actually appear in practice as custom
dbusmock templates are usually shipped in project directories, not
directly in world-writable directories.
(LP: #1453815, CVE-2015-1326)
-- Martin Pitt <email address hidden> Tue, 12 May 2015 13:26:28 +0200
This bug was fixed in the package python-dbusmock - 0.10.1-1ubuntu1
---------------
python-dbusmock (0.10.1-1ubuntu1) trusty-security; urgency=medium
* SECURITY FIX: When loading a template from an arbitrary file through the spawn_server_ template( )
AddTemplate() D-Bus method call or DBusTestCase.
Python method, don't create or use Python's *.pyc cached files. By
tricking a user into loading a template from a world-writable directory
like /tmp, an attacker could run arbitrary code with the user's
privileges by putting a crafted .pyc file into that directory.
Note that this is highly unlikely to actually appear in practice as custom
dbusmock templates are usually shipped in project directories, not
directly in world-writable directories.
(LP: #1453815, CVE-2015-1326)
-- Martin Pitt <email address hidden> Tue, 12 May 2015 13:26:28 +0200