Name | CVE-2019-20478 |
Description | In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ruamel.yaml (PTS) | stretch | 0.13.4-2 | vulnerable |
| buster | 0.15.34-1 | vulnerable |
| bullseye | 0.16.12-2 | vulnerable |
| bookworm | 0.17.21-1 | vulnerable |
| sid, trixie | 0.18.6+ds-3 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
ruamel.yaml | source | (unstable) | (unfixed) | unimportant | | |
Notes
This is a well-known design deficiency in pyyaml (of which ruamel.yaml is derived),
various CVE IDs have been assigned to applications misusing the API over the years.
pyyaml 5.1 changed the default hebaviour