This bug was fixed in the package python-dbusmock - 0.11.4-1ubuntu1
---------------
python-dbusmock (0.11.4-1ubuntu1) utopic-security; urgency=medium
* SECURITY FIX: When loading a template from an arbitrary file through the
AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template()
Python method, don't create or use Python's *.pyc cached files. By
tricking a user into loading a template from a world-writable directory
like /tmp, an attacker could run arbitrary code with the user's
privileges by putting a crafted .pyc file into that directory.
Note that this is highly unlikely to actually appear in practice as custom
dbusmock templates are usually shipped in project directories, not
directly in world-writable directories.
(LP: #1453815, CVE-2015-1326)
-- Martin Pitt <[email protected]> Tue, 12 May 2015 13:23:38
+0200
** Changed in: python-dbusmock (Ubuntu Utopic)
Status: In Progress => Fix Released
** Changed in: python-dbusmock (Ubuntu Vivid)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1453815
Title:
arbitrary code execution or file overwrite when templates are loaded
from /tmp
To manage notifications about this bug go to:
https://bugs.launchpad.net/python-dbusmock/+bug/1453815/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs