CVE-2014-3539

NameCVE-2014-3539
Descriptionbase/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs777525

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rope (PTS)buster0.10.5-3fixed
bullseye0.18.0-1fixed
bookworm1.7.0-1fixed
sid, trixie1.13.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ropesource(unstable)0.10.3-1777525

Notes

[jessie] - rope <no-dsa> (Minor issue)
[squeeze] - rope <no-dsa> (Minor issue)
[wheezy] - rope <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=1116485
https://github.com/python-rope/rope/issues/105
0.10.3-1 only adds a mitigation for the issue, so not completely fixed.
Still mark it as fixed in this version because patch limits socket
connections to localhost only

Search for package or bug name: Reporting problems