PyYAML: Arbitrary code execution — GLSA 202003-45

A flaw in PyYAML might allow attackers to execute arbitrary code.

Affected packages

dev-python/pyyaml on all architectures
Affected versions < 5.1
Unaffected versions >= 5.1

Background

PyYAML is a YAML parser and emitter for Python.

Description

It was found that using yaml.load() API on untrusted input could lead to arbitrary code execution.

Impact

A remote attacker could entice a user to process specially crafted input in an application using yaml.load() from PyYAML, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All PyYAML users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/pyyaml-5.1"
 

References

Release date
March 19, 2020

Latest revision
March 19, 2020: 1

Severity
high

Exploitable
local, remote

Bugzilla entries