Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-14343
HistoryFeb 09, 2021 - 12:00 a.m.

CVE-2020-14343

2021-02-0900:00:00
ubuntu.com
ubuntu.com
28

0.003 Low

EPSS

Percentile

67.7%

A vulnerability was discovered in the PyYAML library in versions before
5.4, where it is susceptible to arbitrary code execution when it processes
untrusted YAML files through the full_load method or with the FullLoader
loader. Applications that use the library to process untrusted input may be
vulnerable to this flaw. This flaw allows an attacker to execute arbitrary
code on the system by abusing the python/object/new constructor. This flaw
is due to an incomplete fix for CVE-2020-1747.

Bugs

Notes

Author Note
sbeattie incomplete fix of CVE-2020-1747
mdeslaur FullLoader was introduced in 5.1. FullLoader should not be used on untrusted input.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchpyyaml< 5.3.1-1ubuntu0.1UNKNOWN
ubuntu20.10noarchpyyaml< 5.3.1-2ubuntu0.1UNKNOWN
ubuntu21.04noarchpyyaml< 5.3.1-3ubuntu1UNKNOWN