In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/yaml/pyyaml/pull/74 | third party advisory patch |
https://github.com/yaml/pyyaml/blob/master/CHANGES | third party advisory release notes |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/ | vendor advisory |
https://github.com/marshmallow-code/apispec/issues/278 | third party advisory |
https://github.com/yaml/pyyaml/issues/193 | third party advisory |
https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation | |
https://security.gentoo.org/glsa/202003-45 | third party advisory vendor advisory |