Updated python-rope packages fix security vulnerabilities
Publication date: 01 Apr 2015Modification date: 01 Apr 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2014-3539
Description
The python-rope utility has been caught passing remotely supplied data to
pickle.load(), enabling possible code-execution attacks. This can happen when
the 'perform_doa' (dynamic object analysis) option is enabled, which it
previously had been by default.
This update changes the default configuration to disable this option. This
only mitigates the issue, as it will still be vulnerable if the option is
enabled.
If 'perform_doa' is enabled, python-rope can be persuaded to open under some
circumstances a network port for short moment of time, which can be used to
push commands to the running process, so the process could run some commands
under the privileges of the user running python-rope. Anyone who enables this
option is advised to make sure the computer is protected by a firewall.
References
SRPMS
4/core
- python-rope-0.9.4-4.1.mga4