MarkBaggett <lo127...@gmail.com> added the comment:

"Dont load untrusted config files" is the answer I expected. It the only safe 
answer really. But is there really a mechanism to provide trust of an external 
config file other that file permissions? It doesn't seem like hmac or digital 
signatures work because you have to provide a mechanism to resign it every time 
they change a config. So an attacker could just resign after adding the 
exploit. Maybe file permissions is all we have. 

Is it reasonable to say that all classes  by _resolve() and resolve() should 
have "logger." at the top of them? If not perhaps the object could have a 
permitted list of top level packages that defaults to just "logger." but could 
be extended to others by the developer.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue46251>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to