Package: py2play
Version: 0.1.7-1

py2play uses Python pickle for sharing Soya objects (or other classes) 
over a P2P network.  Pickle objects, when unpickled, contain both data 
and code.  A malicious user on a game's P2P net can send custom classes 
to fellow players in order to gain access to their systems or execute 
malicious commands.  

There is no fix to this, this flaw is at py2play's core.  The maintainer 
of this package has been aware of this security flaw for some time and 
has not only ignored it, but replaced it with a new module called "tofu" 
which has the same vulnerability.

At a minimum, users of this Python module need to be aware of this.

-- 

Diversity is the Fuel of Evolution, 
 Conformity it's Starvation.
Be Radical.  Be New.  Be Different. 
Feed Evolution with Everything You Are.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to