Upstream information
Description
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python code, and the integrated data package download functionality is used. This affects, for example, averaged_perceptron_tagger and punkt.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
CNA (CISA-ADP) | |
---|---|
Base Score | 9.8 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2024:0221-1, published Sat Aug 24 14:48:34 2024
- openSUSE-SU-2024:0222-1, published Fri Jul 26 18:49:20 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub 15 SP5 |
| Patchnames: openSUSE-2024-222 |
SUSE Package Hub 15 SP6 |
| Patchnames: openSUSE-2024-221 |
openSUSE Leap 15.5 |
| Patchnames: openSUSE-2024-222 |
openSUSE Leap 15.6 |
| Patchnames: openSUSE-2024-221 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-14103 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 02:00:14 2024CVE page last modified: Tue Nov 5 11:58:16 2024