GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Mar 19, 2020 11:26 pm Post subject: [ GLSA 202003-45 ] PyYAML |
|
|
Gentoo Linux Security Advisory
Title: PyYAML: Arbitrary code execution (GLSA 202003-45)
Severity: high
Exploitable: local, remote
Date: 2020-03-19
Bug(s): #659348
ID: 202003-45
Synopsis
A flaw in PyYAML might allow attackers to execute arbitrary code.
Background
PyYAML is a YAML parser and emitter for Python.
Affected Packages
Package: dev-python/pyyaml
Vulnerable: < 5.1
Unaffected: >= 5.1
Architectures: All supported architectures
Description
It was found that using yaml.load() API on untrusted input could lead to
arbitrary code execution.
Impact
A remote attacker could entice a user to process specially crafted input
in an application using yaml.load() from PyYAML, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All PyYAML users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/pyyaml-5.1"
|
References
CVE-2017-18342 |
|