Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20477

Опубликовано: 19 фев. 2020
Источник: debian
EPSS Низкий

Описание

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pyyamlfixed5.2-1package
pyyamlnot-affectedbusterpackage
pyyamlnot-affectedstretchpackage
pyyamlnot-affectedjessiepackage

Примечания

  • CVE exists due to an incomplete fix for CVE-2017-18342.

EPSS

Процентиль: 65%
0.00504
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
redhat
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
nvd
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
github
больше 4 лет назад

Deserialization of Untrusted Data in PyYAML

rocky
почти 5 лет назад

Moderate: python38:3.8 security, bug fix, and enhancement update

EPSS

Процентиль: 65%
0.00504
Низкий