{"id":"MGASA-2021-0119","summary":"Updated python-yaml packages fix security vulnerability","details":"A vulnerability was discovered in the PyYAML library, where it is susceptible\nto arbitrary code execution when it processes untrusted YAML files through the\nfull_load method or with the FullLoader loader. Applications that use the\nlibrary to process untrusted input may be vulnerable to this flaw. This flaw\nallows an attacker to execute arbitrary code on the system by abusing the\npython/object/new constructor. This flaw is due to an incomplete fix for\nCVE-2020-1747 (CVE-2020-14343).\n","modified":"2026-02-04T02:37:20.860486Z","published":"2021-03-12T01:25:47Z","related":["CVE-2020-14343"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0119.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28205"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/"}],"affected":[{"package":{"name":"python-yaml","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/python-yaml?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.3.1-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0119.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}