MGASA-2015-0122

Source
https://advisories.mageia.org/MGASA-2015-0122.html
Import Source
https://advisories.mageia.org/MGASA-2015-0122.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0122
Related
Published
2015-04-01T12:13:37Z
Modified
2015-04-01T12:03:21Z
Summary
Updated python-rope packages fix security vulnerabilities
Details

The python-rope utility has been caught passing remotely supplied data to pickle.load(), enabling possible code-execution attacks. This can happen when the 'perform_doa' (dynamic object analysis) option is enabled, which it previously had been by default.

This update changes the default configuration to disable this option. This only mitigates the issue, as it will still be vulnerable if the option is enabled.

If 'perform_doa' is enabled, python-rope can be persuaded to open under some circumstances a network port for short moment of time, which can be used to push commands to the running process, so the process could run some commands under the privileges of the user running python-rope. Anyone who enables this option is advised to make sure the computer is protected by a firewall.

References
Credits

Affected packages

Mageia:4 / python-rope

Package

Name
python-rope
Purl
pkg:rpm/mageia/python-rope?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.4-4.1.mga4

Ecosystem specific

{
    "section": "core"
}