Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-18342 (GCVE-0-2017-18342)
Vulnerability from cvelistv5 – Published: 2018-06-27 12:00 – Updated: 2024-08-05 21:20
VLAI?
EPSS
Summary
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
9 references
| URL | Tags |
|---|---|
| https://github.com/yaml/pyyaml/pull/74 | x_refsource_MISC |
| https://github.com/yaml/pyyaml/blob/master/CHANGES | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://github.com/marshmallow-code/apispec/issues/278 | x_refsource_MISC |
| https://github.com/yaml/pyyaml/issues/193 | x_refsource_MISC |
| https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.l… | x_refsource_MISC |
| https://security.gentoo.org/glsa/202003-45 | vendor-advisoryx_refsource_GENTOO |
Date Public ?
2018-06-27 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T21:20:50.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"name": "FEDORA-2019-bed9afe622",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"name": "FEDORA-2019-779a9db46a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"name": "FEDORA-2019-44643e8bcb",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation"
},
{
"name": "GLSA-202003-45",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202003-45"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-19T20:06:10.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"name": "FEDORA-2019-bed9afe622",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"name": "FEDORA-2019-779a9db46a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"name": "FEDORA-2019-44643e8bcb",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation"
},
{
"name": "GLSA-202003-45",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202003-45"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/yaml/pyyaml/pull/74",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"name": "https://github.com/yaml/pyyaml/blob/master/CHANGES",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"name": "FEDORA-2019-bed9afe622",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"name": "FEDORA-2019-779a9db46a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"name": "FEDORA-2019-44643e8bcb",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"name": "https://github.com/marshmallow-code/apispec/issues/278",
"refsource": "MISC",
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"name": "https://github.com/yaml/pyyaml/issues/193",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"name": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation"
},
{
"name": "GLSA-202003-45",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-45"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-18342",
"datePublished": "2018-06-27T12:00:00.000Z",
"dateReserved": "2018-06-27T00:00:00.000Z",
"dateUpdated": "2024-08-05T21:20:50.850Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-18342",
"date": "2026-05-22",
"epss": "0.04807",
"percentile": "0.89606"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.1\", \"matchCriteriaId\": \"9B1739DE-EE4C-4F2D-BAFB-1D56C3624D08\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.\"}, {\"lang\": \"es\", \"value\": \"En PyYAML en versiones anteriores a 5.1, la API yaml.load () podr\\u00eda ejecutar c\\u00f3digo arbitrario si se usara con datos no confiables. La funci\\u00f3n load () ha quedado en desuso en la versi\\u00f3n 5.1 y se ha introducido el \\\"UnsafeLoader\\\" para una compatibilidad hacia atr\\u00e1s con la funci\\u00f3n.\"}]",
"id": "CVE-2017-18342",
"lastModified": "2024-11-21T03:19:53.020",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-06-27T12:29:00.210",
"references": "[{\"url\": \"https://github.com/marshmallow-code/apispec/issues/278\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/blob/master/CHANGES\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/issues/193\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/pull/74\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/202003-45\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/marshmallow-code/apispec/issues/278\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/blob/master/CHANGES\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/issues/193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/pull/74\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202003-45\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-18342\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-06-27T12:29:00.210\",\"lastModified\":\"2024-11-21T03:19:53.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.\"},{\"lang\":\"es\",\"value\":\"En PyYAML en versiones anteriores a 5.1, la API yaml.load () podr\u00eda ejecutar c\u00f3digo arbitrario si se usara con datos no confiables. La funci\u00f3n load () ha quedado en desuso en la versi\u00f3n 5.1 y se ha introducido el \\\"UnsafeLoader\\\" para una compatibilidad hacia atr\u00e1s con la funci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1\",\"matchCriteriaId\":\"9B1739DE-EE4C-4F2D-BAFB-1D56C3624D08\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}],\"references\":[{\"url\":\"https://github.com/marshmallow-code/apispec/issues/278\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/blob/master/CHANGES\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/issues/193\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/pull/74\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202003-45\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/marshmallow-code/apispec/issues/278\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/blob/master/CHANGES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/issues/193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/pull/74\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202003-45\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
BDU:2023-07605
Vulnerability from fstec - Published: 27.06.2018
VLAI Severity ?
Title
Уязвимость компонента yaml.load() библиотеки парсинга YAML для Python PyYAML, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Description
Уязвимость компонента yaml.load() библиотеки парсинга YAML для Python PyYAML связана с восстановлением в памяти недостоверных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Severity ?
Vendor
ООО «РусБИТех-Астра», Сообщество свободного программного обеспечения
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Debian GNU/Linux, PyYAML
Software Version
1.6 «Смоленск» (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), до 5.1 (PyYAML)
Possible Mitigations
Для PyYAML:
использование рекомендаций производителя: https://github.com/yaml/pyyaml/issues/193
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2017-18342
Для ОС Astra Linux:
обновить пакет pyyaml до 5.1.2-1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17
Для Astra Linux 1.6 «Смоленск»:
обновить пакет pyyaml до 3.12-1+ci202309291736+astra1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16
Для Astra Linux Special Edition 4.7:
обновить пакет pyyaml до 5.1.2-1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47
Reference
https://github.com/marshmallow-code/apispec/issues/278
https://github.com/yaml/pyyaml/blob/master/CHANGES
https://github.com/yaml/pyyaml/issues/193
https://github.com/yaml/pyyaml/pull/74
https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation
https://nvd.nist.gov/vuln/detail/CVE-2017-18342
https://security.gentoo.org/glsa/202003-45
https://security-tracker.debian.org/tracker/CVE-2017-18342
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47
CWE
CWE-502
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 5.1 (PyYAML)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f PyYAML:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://github.com/yaml/pyyaml/issues/193\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2017-18342\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 pyyaml \u0434\u043e 5.1.2-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17\n\n\u0414\u043b\u044f Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 pyyaml \u0434\u043e 3.12-1+ci202309291736+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 pyyaml \u0434\u043e 5.1.2-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.06.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.11.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-07605",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-18342",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, PyYAML",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 yaml.load() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043f\u0430\u0440\u0441\u0438\u043d\u0433\u0430 YAML \u0434\u043b\u044f Python PyYAML, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-502)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 yaml.load() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043f\u0430\u0440\u0441\u0438\u043d\u0433\u0430 YAML \u0434\u043b\u044f Python PyYAML \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/marshmallow-code/apispec/issues/278\nhttps://github.com/yaml/pyyaml/blob/master/CHANGES\nhttps://github.com/yaml/pyyaml/issues/193\nhttps://github.com/yaml/pyyaml/pull/74\nhttps://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-18342\nhttps://security.gentoo.org/glsa/202003-45\nhttps://security-tracker.debian.org/tracker/CVE-2017-18342\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-502",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
CERTFR-2026-AVI-0395
Vulnerability from certfr_avis - Published: 2026-04-03 - Updated: 2026-04-03
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x sans le correctif de sécurité PH70422 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP15 IF01 | ||
| IBM | WebSphere Automation | WebSphere Automation versions antérieures à 1.12.0 | ||
| IBM | Storage Protect | Storage Protect Plus Server versions 10.1.x antérieures à 10.1.18 |
References
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x sans le correctif de s\u00e9curit\u00e9 PH70422",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP15 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Automation versions ant\u00e9rieures \u00e0 1.12.0",
"product": {
"name": "WebSphere Automation",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Plus Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.18",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2021-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3200"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2026-27205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27205"
},
{
"name": "CVE-2017-18342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18342"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2019-20477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20477"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-43898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43898"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2021-44568",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44568"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2021-33929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33929"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2024-5629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5629"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2021-33928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33928"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2018-18074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18074"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2019-11340",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11340"
},
{
"name": "CVE-2026-21860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21860"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-27199",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27199"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2021-33930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33930"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2019-18874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18874"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-20270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20270"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2025-14847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14847"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-52317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2019-7548",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7548"
},
{
"name": "CVE-2020-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14422"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2021-33938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33938"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2021-27291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27291"
},
{
"name": "CVE-2019-7164",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7164"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2026-04-03T00:00:00",
"last_revision_date": "2026-04-03T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0395",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7268179",
"url": "https://www.ibm.com/support/pages/node/7268179"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267689",
"url": "https://www.ibm.com/support/pages/node/7267689"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7268331",
"url": "https://www.ibm.com/support/pages/node/7268331"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267801",
"url": "https://www.ibm.com/support/pages/node/7267801"
}
]
}
CNVD-2019-42857
Vulnerability from cnvd - Published: 2019-11-29
VLAI Severity ?
Title
PyYAML存在未明漏洞
Description
PyYAML是一款基于Python的下一代YAML解析器。
PyYAML 4.1之前版本中存在安全漏洞,该漏洞源于程序没有使用‘yaml.safe_load’函数。攻击者可利用该漏洞执行任意代码。
Severity
高
Patch Name
PyYAML存在未明漏洞的补丁
Patch Description
PyYAML是一款基于Python的下一代YAML解析器。
PyYAML 4.1之前版本中存在安全漏洞,该漏洞源于程序没有使用‘yaml.safe_load’函数。攻击者可利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/yaml/pyyaml/blob/master/CHANGES
Reference
https://github.com/yaml/pyyaml/blob/master/CHANGES
Impacted products
| Name | pyyaml PyYAML <4.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-18342",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342"
}
},
"description": "PyYAML\u662f\u4e00\u6b3e\u57fa\u4e8ePython\u7684\u4e0b\u4e00\u4ee3YAML\u89e3\u6790\u5668\u3002\n\nPyYAML 4.1\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u6ca1\u6709\u4f7f\u7528\u2018yaml.safe_load\u2019\u51fd\u6570\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/yaml/pyyaml/blob/master/CHANGES",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-42857",
"openTime": "2019-11-29",
"patchDescription": "PyYAML\u662f\u4e00\u6b3e\u57fa\u4e8ePython\u7684\u4e0b\u4e00\u4ee3YAML\u89e3\u6790\u5668\u3002\r\n\r\nPyYAML 4.1\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u6ca1\u6709\u4f7f\u7528\u2018yaml.safe_load\u2019\u51fd\u6570\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "PyYAML\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "pyyaml PyYAML \u003c4.1"
},
"referenceLink": "https://github.com/yaml/pyyaml/blob/master/CHANGES",
"serverity": "\u9ad8",
"submitTime": "2018-07-04",
"title": "PyYAML\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
FKIE_CVE-2017-18342
Vulnerability from fkie_nvd - Published: 2018-06-27 12:29 - Updated: 2024-11-21 03:19
Severity ?
Summary
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| pyyaml | pyyaml | * | |
| fedoraproject | fedora | 28 | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1739DE-EE4C-4F2D-BAFB-1D56C3624D08",
"versionEndExcluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function."
},
{
"lang": "es",
"value": "En PyYAML en versiones anteriores a 5.1, la API yaml.load () podr\u00eda ejecutar c\u00f3digo arbitrario si se usara con datos no confiables. La funci\u00f3n load () ha quedado en desuso en la versi\u00f3n 5.1 y se ha introducido el \"UnsafeLoader\" para una compatibilidad hacia atr\u00e1s con la funci\u00f3n."
}
],
"id": "CVE-2017-18342",
"lastModified": "2024-11-21T03:19:53.020",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-27T12:29:00.210",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-45"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-RPRW-H62V-C2W7
Vulnerability from github – Published: 2019-01-04 17:45 – Updated: 2024-10-16 20:51
VLAI?
Summary
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
Details
In PyYAML before 4.1, the yaml.load() API could execute arbitrary code. In other words, yaml.safe_load is not used.
Severity ?
9.8 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "PyYAML"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-18342"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:55:26Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.",
"id": "GHSA-rprw-h62v-c2w7",
"modified": "2024-10-16T20:51:25Z",
"published": "2019-01-04T17:45:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18342"
},
{
"type": "WEB",
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"type": "WEB",
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"type": "WEB",
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"type": "WEB",
"url": "https://github.com/yaml/pyyaml/commit/7b68405c81db889f83c32846462b238ccae5be80"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyyaml/PYSEC-2018-49.yaml"
},
{
"type": "PACKAGE",
"url": "https://github.com/yaml/pyyaml"
},
{
"type": "WEB",
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"type": "WEB",
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202003-45"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "PyYAML insecurely deserializes YAML strings leading to arbitrary code execution"
}
GSD-2017-18342
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-18342",
"description": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"id": "GSD-2017-18342",
"references": [
"https://www.suse.com/security/cve/CVE-2017-18342.html",
"https://advisories.mageia.org/CVE-2017-18342.html",
"https://security.archlinux.org/CVE-2017-18342",
"https://linux.oracle.com/cve/CVE-2017-18342.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-18342"
],
"details": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"id": "GSD-2017-18342",
"modified": "2023-12-13T01:21:11.250573Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/yaml/pyyaml/pull/74",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"name": "https://github.com/yaml/pyyaml/blob/master/CHANGES",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"name": "FEDORA-2019-bed9afe622",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"name": "FEDORA-2019-779a9db46a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"name": "FEDORA-2019-44643e8bcb",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"name": "https://github.com/marshmallow-code/apispec/issues/278",
"refsource": "MISC",
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"name": "https://github.com/yaml/pyyaml/issues/193",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"name": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation",
"refsource": "MISC",
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation"
},
{
"name": "GLSA-202003-45",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-45"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c5.1",
"affected_versions": "All versions before 5.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-502",
"CWE-937"
],
"date": "2019-06-24",
"description": "In PyYAML, the `yaml.load()` API could execute arbitrary code if used with untrusted data.",
"fixed_versions": [
"5.1"
],
"identifier": "CVE-2017-18342",
"identifiers": [
"CVE-2017-18342"
],
"not_impacted": "All versions starting from 5.1",
"package_slug": "pypi/PyYAML",
"pubdate": "2018-06-27",
"solution": "Upgrade to version 5.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://github.com/yaml/pyyaml/pull/74",
"https://github.com/yaml/pyyaml/blob/master/CHANGES"
],
"uuid": "9f23df3d-089c-4b26-b36c-844f8abb87cf"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18342"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/yaml/pyyaml/pull/74",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/pull/74"
},
{
"name": "https://github.com/yaml/pyyaml/blob/master/CHANGES",
"refsource": "MISC",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/blob/master/CHANGES"
},
{
"name": "FEDORA-2019-bed9afe622",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/"
},
{
"name": "FEDORA-2019-779a9db46a",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/"
},
{
"name": "FEDORA-2019-44643e8bcb",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/"
},
{
"name": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation"
},
{
"name": "https://github.com/marshmallow-code/apispec/issues/278",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/marshmallow-code/apispec/issues/278"
},
{
"name": "https://github.com/yaml/pyyaml/issues/193",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yaml/pyyaml/issues/193"
},
{
"name": "GLSA-202003-45",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-45"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": true,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-10-14T13:23Z",
"publishedDate": "2018-06-27T12:29Z"
}
}
}
OPENSUSE-SU-2024:11108-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
oci-cli-3.0.2-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: oci-cli-3.0.2-1.2 on GA media
Description of the patch: These are all security issues fixed in the oci-cli-3.0.2-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11108
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
12 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "oci-cli-3.0.2-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the oci-cli-3.0.2-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11108",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11108-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18342 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14343 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29651 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29651/"
}
],
"title": "oci-cli-3.0.2-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11108-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "oci-cli-3.0.2-1.2.aarch64",
"product": {
"name": "oci-cli-3.0.2-1.2.aarch64",
"product_id": "oci-cli-3.0.2-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "oci-cli-3.0.2-1.2.ppc64le",
"product": {
"name": "oci-cli-3.0.2-1.2.ppc64le",
"product_id": "oci-cli-3.0.2-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "oci-cli-3.0.2-1.2.s390x",
"product": {
"name": "oci-cli-3.0.2-1.2.s390x",
"product_id": "oci-cli-3.0.2-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "oci-cli-3.0.2-1.2.x86_64",
"product": {
"name": "oci-cli-3.0.2-1.2.x86_64",
"product_id": "oci-cli-3.0.2-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-cli-3.0.2-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64"
},
"product_reference": "oci-cli-3.0.2-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-cli-3.0.2-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le"
},
"product_reference": "oci-cli-3.0.2-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-cli-3.0.2-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x"
},
"product_reference": "oci-cli-3.0.2-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-cli-3.0.2-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
},
"product_reference": "oci-cli-3.0.2-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18342"
}
],
"notes": [
{
"category": "general",
"text": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18342",
"url": "https://www.suse.com/security/cve/CVE-2017-18342"
},
{
"category": "external",
"summary": "SUSE Bug 1099308 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1099308"
},
{
"category": "external",
"summary": "SUSE Bug 1164453 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1164453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-18342"
},
{
"cve": "CVE-2020-14343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14343"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14343",
"url": "https://www.suse.com/security/cve/CVE-2020-14343"
},
{
"category": "external",
"summary": "SUSE Bug 1174514 for CVE-2020-14343",
"url": "https://bugzilla.suse.com/1174514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14343"
},
{
"cve": "CVE-2020-29651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29651"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29651",
"url": "https://www.suse.com/security/cve/CVE-2020-29651"
},
{
"category": "external",
"summary": "SUSE Bug 1179805 for CVE-2020-29651",
"url": "https://bugzilla.suse.com/1179805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.aarch64",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.ppc64le",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.s390x",
"openSUSE Tumbleweed:oci-cli-3.0.2-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29651"
}
]
}
OPENSUSE-SU-2024:11210-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
python36-PyYAML-5.4.1-1.6 on GA media
Severity
Moderate
Notes
Title of the patch: python36-PyYAML-5.4.1-1.6 on GA media
Description of the patch: These are all security issues fixed in the python36-PyYAML-5.4.1-1.6 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11210
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.4 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
9 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python36-PyYAML-5.4.1-1.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python36-PyYAML-5.4.1-1.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11210",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11210-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18342 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14343 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14343/"
}
],
"title": "python36-PyYAML-5.4.1-1.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11210-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python36-PyYAML-5.4.1-1.6.aarch64",
"product": {
"name": "python36-PyYAML-5.4.1-1.6.aarch64",
"product_id": "python36-PyYAML-5.4.1-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "python38-PyYAML-5.4.1-1.6.aarch64",
"product": {
"name": "python38-PyYAML-5.4.1-1.6.aarch64",
"product_id": "python38-PyYAML-5.4.1-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "python39-PyYAML-5.4.1-1.6.aarch64",
"product": {
"name": "python39-PyYAML-5.4.1-1.6.aarch64",
"product_id": "python39-PyYAML-5.4.1-1.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-PyYAML-5.4.1-1.6.ppc64le",
"product": {
"name": "python36-PyYAML-5.4.1-1.6.ppc64le",
"product_id": "python36-PyYAML-5.4.1-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-PyYAML-5.4.1-1.6.ppc64le",
"product": {
"name": "python38-PyYAML-5.4.1-1.6.ppc64le",
"product_id": "python38-PyYAML-5.4.1-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-PyYAML-5.4.1-1.6.ppc64le",
"product": {
"name": "python39-PyYAML-5.4.1-1.6.ppc64le",
"product_id": "python39-PyYAML-5.4.1-1.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-PyYAML-5.4.1-1.6.s390x",
"product": {
"name": "python36-PyYAML-5.4.1-1.6.s390x",
"product_id": "python36-PyYAML-5.4.1-1.6.s390x"
}
},
{
"category": "product_version",
"name": "python38-PyYAML-5.4.1-1.6.s390x",
"product": {
"name": "python38-PyYAML-5.4.1-1.6.s390x",
"product_id": "python38-PyYAML-5.4.1-1.6.s390x"
}
},
{
"category": "product_version",
"name": "python39-PyYAML-5.4.1-1.6.s390x",
"product": {
"name": "python39-PyYAML-5.4.1-1.6.s390x",
"product_id": "python39-PyYAML-5.4.1-1.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-PyYAML-5.4.1-1.6.x86_64",
"product": {
"name": "python36-PyYAML-5.4.1-1.6.x86_64",
"product_id": "python36-PyYAML-5.4.1-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "python38-PyYAML-5.4.1-1.6.x86_64",
"product": {
"name": "python38-PyYAML-5.4.1-1.6.x86_64",
"product_id": "python38-PyYAML-5.4.1-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "python39-PyYAML-5.4.1-1.6.x86_64",
"product": {
"name": "python39-PyYAML-5.4.1-1.6.x86_64",
"product_id": "python39-PyYAML-5.4.1-1.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-PyYAML-5.4.1-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64"
},
"product_reference": "python36-PyYAML-5.4.1-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-PyYAML-5.4.1-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le"
},
"product_reference": "python36-PyYAML-5.4.1-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-PyYAML-5.4.1-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x"
},
"product_reference": "python36-PyYAML-5.4.1-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-PyYAML-5.4.1-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64"
},
"product_reference": "python36-PyYAML-5.4.1-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-PyYAML-5.4.1-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64"
},
"product_reference": "python38-PyYAML-5.4.1-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-PyYAML-5.4.1-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le"
},
"product_reference": "python38-PyYAML-5.4.1-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-PyYAML-5.4.1-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x"
},
"product_reference": "python38-PyYAML-5.4.1-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-PyYAML-5.4.1-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64"
},
"product_reference": "python38-PyYAML-5.4.1-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyYAML-5.4.1-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64"
},
"product_reference": "python39-PyYAML-5.4.1-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyYAML-5.4.1-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le"
},
"product_reference": "python39-PyYAML-5.4.1-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyYAML-5.4.1-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x"
},
"product_reference": "python39-PyYAML-5.4.1-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyYAML-5.4.1-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
},
"product_reference": "python39-PyYAML-5.4.1-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18342"
}
],
"notes": [
{
"category": "general",
"text": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18342",
"url": "https://www.suse.com/security/cve/CVE-2017-18342"
},
{
"category": "external",
"summary": "SUSE Bug 1099308 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1099308"
},
{
"category": "external",
"summary": "SUSE Bug 1164453 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1164453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-18342"
},
{
"cve": "CVE-2020-14343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14343"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14343",
"url": "https://www.suse.com/security/cve/CVE-2020-14343"
},
{
"category": "external",
"summary": "SUSE Bug 1174514 for CVE-2020-14343",
"url": "https://bugzilla.suse.com/1174514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python36-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python38-PyYAML-5.4.1-1.6.x86_64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.aarch64",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.ppc64le",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.s390x",
"openSUSE Tumbleweed:python39-PyYAML-5.4.1-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14343"
}
]
}
OPENSUSE-SU-2024:11247-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
python36-openapi-spec-validator-0.2.9-1.5 on GA media
Severity
Moderate
Notes
Title of the patch: python36-openapi-spec-validator-0.2.9-1.5 on GA media
Description of the patch: These are all security issues fixed in the python36-openapi-spec-validator-0.2.9-1.5 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11247
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.4 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
6 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python36-openapi-spec-validator-0.2.9-1.5 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python36-openapi-spec-validator-0.2.9-1.5 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11247",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11247-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18342 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18342/"
}
],
"title": "python36-openapi-spec-validator-0.2.9-1.5 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11247-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"product": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"product_id": "python36-openapi-spec-validator-0.2.9-1.5.aarch64"
}
},
{
"category": "product_version",
"name": "python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"product": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"product_id": "python38-openapi-spec-validator-0.2.9-1.5.aarch64"
}
},
{
"category": "product_version",
"name": "python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"product": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"product_id": "python39-openapi-spec-validator-0.2.9-1.5.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product_id": "python36-openapi-spec-validator-0.2.9-1.5.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product_id": "python38-openapi-spec-validator-0.2.9-1.5.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"product_id": "python39-openapi-spec-validator-0.2.9-1.5.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-openapi-spec-validator-0.2.9-1.5.s390x",
"product": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.s390x",
"product_id": "python36-openapi-spec-validator-0.2.9-1.5.s390x"
}
},
{
"category": "product_version",
"name": "python38-openapi-spec-validator-0.2.9-1.5.s390x",
"product": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.s390x",
"product_id": "python38-openapi-spec-validator-0.2.9-1.5.s390x"
}
},
{
"category": "product_version",
"name": "python39-openapi-spec-validator-0.2.9-1.5.s390x",
"product": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.s390x",
"product_id": "python39-openapi-spec-validator-0.2.9-1.5.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"product": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"product_id": "python36-openapi-spec-validator-0.2.9-1.5.x86_64"
}
},
{
"category": "product_version",
"name": "python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"product": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"product_id": "python38-openapi-spec-validator-0.2.9-1.5.x86_64"
}
},
{
"category": "product_version",
"name": "python39-openapi-spec-validator-0.2.9-1.5.x86_64",
"product": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.x86_64",
"product_id": "python39-openapi-spec-validator-0.2.9-1.5.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.aarch64"
},
"product_reference": "python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.ppc64le"
},
"product_reference": "python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.s390x"
},
"product_reference": "python36-openapi-spec-validator-0.2.9-1.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-openapi-spec-validator-0.2.9-1.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.x86_64"
},
"product_reference": "python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.aarch64"
},
"product_reference": "python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.ppc64le"
},
"product_reference": "python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.s390x"
},
"product_reference": "python38-openapi-spec-validator-0.2.9-1.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-openapi-spec-validator-0.2.9-1.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.x86_64"
},
"product_reference": "python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.aarch64"
},
"product_reference": "python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.ppc64le"
},
"product_reference": "python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.s390x"
},
"product_reference": "python39-openapi-spec-validator-0.2.9-1.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-openapi-spec-validator-0.2.9-1.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.x86_64"
},
"product_reference": "python39-openapi-spec-validator-0.2.9-1.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18342"
}
],
"notes": [
{
"category": "general",
"text": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18342",
"url": "https://www.suse.com/security/cve/CVE-2017-18342"
},
{
"category": "external",
"summary": "SUSE Bug 1099308 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1099308"
},
{
"category": "external",
"summary": "SUSE Bug 1164453 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1164453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python36-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python38-openapi-spec-validator-0.2.9-1.5.x86_64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.aarch64",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.ppc64le",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.s390x",
"openSUSE Tumbleweed:python39-openapi-spec-validator-0.2.9-1.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-18342"
}
]
}
OPENSUSE-SU-2024:14089-1
Vulnerability from csaf_opensuse - Published: 2024-07-02 00:00 - Updated: 2024-07-02 00:00Summary
python310-PyYAML-6.0.1-4.1 on GA media
Severity
Moderate
Notes
Title of the patch: python310-PyYAML-6.0.1-4.1 on GA media
Description of the patch: These are all security issues fixed in the python310-PyYAML-6.0.1-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-14089
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.4 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
9 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-PyYAML-6.0.1-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-PyYAML-6.0.1-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14089",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14089-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18342 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14343 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14343/"
}
],
"title": "python310-PyYAML-6.0.1-4.1 on GA media",
"tracking": {
"current_release_date": "2024-07-02T00:00:00Z",
"generator": {
"date": "2024-07-02T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14089-1",
"initial_release_date": "2024-07-02T00:00:00Z",
"revision_history": [
{
"date": "2024-07-02T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-PyYAML-6.0.1-4.1.aarch64",
"product": {
"name": "python310-PyYAML-6.0.1-4.1.aarch64",
"product_id": "python310-PyYAML-6.0.1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-PyYAML-6.0.1-4.1.aarch64",
"product": {
"name": "python311-PyYAML-6.0.1-4.1.aarch64",
"product_id": "python311-PyYAML-6.0.1-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-PyYAML-6.0.1-4.1.aarch64",
"product": {
"name": "python312-PyYAML-6.0.1-4.1.aarch64",
"product_id": "python312-PyYAML-6.0.1-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-PyYAML-6.0.1-4.1.ppc64le",
"product": {
"name": "python310-PyYAML-6.0.1-4.1.ppc64le",
"product_id": "python310-PyYAML-6.0.1-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-PyYAML-6.0.1-4.1.ppc64le",
"product": {
"name": "python311-PyYAML-6.0.1-4.1.ppc64le",
"product_id": "python311-PyYAML-6.0.1-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-PyYAML-6.0.1-4.1.ppc64le",
"product": {
"name": "python312-PyYAML-6.0.1-4.1.ppc64le",
"product_id": "python312-PyYAML-6.0.1-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-PyYAML-6.0.1-4.1.s390x",
"product": {
"name": "python310-PyYAML-6.0.1-4.1.s390x",
"product_id": "python310-PyYAML-6.0.1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-PyYAML-6.0.1-4.1.s390x",
"product": {
"name": "python311-PyYAML-6.0.1-4.1.s390x",
"product_id": "python311-PyYAML-6.0.1-4.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-PyYAML-6.0.1-4.1.s390x",
"product": {
"name": "python312-PyYAML-6.0.1-4.1.s390x",
"product_id": "python312-PyYAML-6.0.1-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-PyYAML-6.0.1-4.1.x86_64",
"product": {
"name": "python310-PyYAML-6.0.1-4.1.x86_64",
"product_id": "python310-PyYAML-6.0.1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-PyYAML-6.0.1-4.1.x86_64",
"product": {
"name": "python311-PyYAML-6.0.1-4.1.x86_64",
"product_id": "python311-PyYAML-6.0.1-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-PyYAML-6.0.1-4.1.x86_64",
"product": {
"name": "python312-PyYAML-6.0.1-4.1.x86_64",
"product_id": "python312-PyYAML-6.0.1-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-PyYAML-6.0.1-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64"
},
"product_reference": "python310-PyYAML-6.0.1-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-PyYAML-6.0.1-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le"
},
"product_reference": "python310-PyYAML-6.0.1-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-PyYAML-6.0.1-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x"
},
"product_reference": "python310-PyYAML-6.0.1-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-PyYAML-6.0.1-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64"
},
"product_reference": "python310-PyYAML-6.0.1-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-PyYAML-6.0.1-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64"
},
"product_reference": "python311-PyYAML-6.0.1-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-PyYAML-6.0.1-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le"
},
"product_reference": "python311-PyYAML-6.0.1-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-PyYAML-6.0.1-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x"
},
"product_reference": "python311-PyYAML-6.0.1-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-PyYAML-6.0.1-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64"
},
"product_reference": "python311-PyYAML-6.0.1-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-PyYAML-6.0.1-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64"
},
"product_reference": "python312-PyYAML-6.0.1-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-PyYAML-6.0.1-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le"
},
"product_reference": "python312-PyYAML-6.0.1-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-PyYAML-6.0.1-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x"
},
"product_reference": "python312-PyYAML-6.0.1-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-PyYAML-6.0.1-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
},
"product_reference": "python312-PyYAML-6.0.1-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18342"
}
],
"notes": [
{
"category": "general",
"text": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18342",
"url": "https://www.suse.com/security/cve/CVE-2017-18342"
},
{
"category": "external",
"summary": "SUSE Bug 1099308 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1099308"
},
{
"category": "external",
"summary": "SUSE Bug 1164453 for CVE-2017-18342",
"url": "https://bugzilla.suse.com/1164453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-02T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-18342"
},
{
"cve": "CVE-2020-14343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14343"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14343",
"url": "https://www.suse.com/security/cve/CVE-2020-14343"
},
{
"category": "external",
"summary": "SUSE Bug 1174514 for CVE-2020-14343",
"url": "https://bugzilla.suse.com/1174514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python310-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python311-PyYAML-6.0.1-4.1.x86_64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.aarch64",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.ppc64le",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.s390x",
"openSUSE Tumbleweed:python312-PyYAML-6.0.1-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-02T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14343"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…