Discussion:
Bug#966233: pyyaml: CVE-2020-14343
(too old to reply)
Salvatore Bonaccorso
2020-07-25 07:40:02 UTC
Permalink
Source: pyyaml
Version: 5.3.1-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/yaml/pyyaml/issues/420
X-Debbugs-Cc: Debian Security Team <***@security.debian.org>

Hi,

The following vulnerability was published for pyyaml.

CVE-2020-14343[0]:
| .load() and FullLoader still vulnerable to fairly trivial RCE

The CVE is for an incomplete fix of CVE-2020-1747, see [1].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343
[1] https://github.com/yaml/pyyaml/issues/420

Regards,
Salvatore
Salvatore Bonaccorso
2021-01-15 21:40:01 UTC
Permalink
Hi,
Post by Salvatore Bonaccorso
Source: pyyaml
Version: 5.3.1-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/yaml/pyyaml/issues/420
Hi,
The following vulnerability was published for pyyaml.
| .load() and FullLoader still vulnerable to fairly trivial RCE
The CVE is for an incomplete fix of CVE-2020-1747, see [1].
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
[0] https://security-tracker.debian.org/tracker/CVE-2020-14343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343
[1] https://github.com/yaml/pyyaml/issues/420
If I understand the situation correctly, then this has been fixed via
https://github.com/yaml/pyyaml/pull/472/commits/7adc0db3f613a82669f2b168edd98379b83adb3c
.

As such can you check and make it enter bullseye?

Regards,
Salvatore

Loading...