{"id":"MGASA-2015-0122","summary":"Updated python-rope packages fix security vulnerabilities","details":"The python-rope utility has been caught passing remotely supplied data to \npickle.load(), enabling possible code-execution attacks. This can happen when\nthe 'perform_doa' (dynamic object analysis) option is enabled, which it\npreviously had been by default.\n\nThis update changes the default configuration to disable this option. This\nonly mitigates the issue, as it will still be vulnerable if the option is\nenabled.\n\nIf 'perform_doa' is enabled, python-rope can be persuaded to open under some\ncircumstances a network port for short moment of time, which can be used to\npush commands to the running process, so the process could run some commands\nunder the privileges of the user running python-rope. Anyone who enables this\noption is advised to make sure the computer is protected by a firewall.\n","modified":"2026-04-16T06:23:23.982937334Z","published":"2015-04-01T12:13:37Z","upstream":["CVE-2014-3539"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0122.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15427"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00004.html"}],"affected":[{"package":{"name":"python-rope","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/python-rope?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.4-4.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0122.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}