Upstream information

CVE-2014-3539 at MITRE

Description

base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  NVD
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
 
Base Score
Vector
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
CVSSv3 Version
SUSE Bugzilla entry: 916890 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2015:0413-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • python-rope >= 0.10.2-2.2
  • python310-rope >= 1.12.0-1.3
  • python311-rope >= 1.12.0-1.3
  • python312-rope >= 1.12.0-1.3
  • python36-rope >= 0.19.0-1.3
  • python38-rope >= 0.19.0-1.3
  • python39-rope >= 0.19.0-1.3
Patchnames:
openSUSE-Tumbleweed-2024-10052
openSUSE-Tumbleweed-2024-11267
openSUSE-Tumbleweed-2024-14161


SUSE Timeline for this CVE

CVE page created: Sat Feb 7 02:42:11 2015
CVE page last modified: Mon Sep 9 17:30:04 2024