Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2841-1

Опубликовано: 18 авг. 2022
Источник: suse-cvrf

Описание

Security update for python-PyYAML

This update for python-PyYAML fixes the following issues:

  • CVE-2020-1747: Fixed an arbitrary code execution issue when parsing an untrusted YAML file with the default loader (bsc#1165439).
  • CVE-2020-14343: Completed the fix for CVE-2020-1747 (bsc#1174514).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15-ESPOS
python2-PyYAML-5.1.2-150000.3.6.1
python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
python2-PyYAML-5.1.2-150000.3.6.1
python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise Module for Public Cloud 15
python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise Server 15-LTSS
python2-PyYAML-5.1.2-150000.3.6.1
python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise Server for SAP Applications 15
python2-PyYAML-5.1.2-150000.3.6.1
python3-PyYAML-5.1.2-150000.3.6.1

Описание

A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15-ESPOS:python2-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS:python2-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS:python3-PyYAML-5.1.2-150000.3.6.1

Ссылки

Описание

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15-ESPOS:python2-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:python3-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS:python2-PyYAML-5.1.2-150000.3.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS:python3-PyYAML-5.1.2-150000.3.6.1

Ссылки
Уязвимость SUSE-SU-2022:2841-1