Security update for python-PyYAML

Announcement ID: SUSE-SU-2021:2818-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2020-14343 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2020-14343 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • HPE Helion OpenStack 8
  • Public Cloud Module 12
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise High Performance Computing 12 SP3
  • SUSE Linux Enterprise High Performance Computing 12 SP4
  • SUSE Linux Enterprise High Performance Computing 12 SP5
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 12 SP1
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server 12 SP3
  • SUSE Linux Enterprise Server 12 SP3 BCL 12-SP3
  • SUSE Linux Enterprise Server 12 SP3 ESPOS 12-SP3
  • SUSE Linux Enterprise Server 12 SP3 LTSS 12-SP3
  • SUSE Linux Enterprise Server 12 SP4
  • SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4
  • SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4
  • SUSE Linux Enterprise Server 12 SP5
  • SUSE Linux Enterprise Server for SAP Applications 12
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5
  • SUSE OpenStack Cloud 7
  • SUSE OpenStack Cloud 8
  • SUSE OpenStack Cloud 9
  • SUSE OpenStack Cloud Crowbar 8
  • SUSE OpenStack Cloud Crowbar 9

An update that solves one vulnerability can now be installed.

Description:

This update for python-PyYAML fixes the following issues:

  • Update to 5.3.1.

  • CVE-2020-14343: A vulnerability was discovered in the PyYAML library, where it was susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • HPE Helion OpenStack 8
    zypper in -t patch HPE-Helion-OpenStack-8-2021-2818=1
  • SUSE OpenStack Cloud 7
    zypper in -t patch SUSE-OpenStack-Cloud-7-2021-2818=1
  • SUSE OpenStack Cloud 8
    zypper in -t patch SUSE-OpenStack-Cloud-8-2021-2818=1
  • SUSE OpenStack Cloud 9
    zypper in -t patch SUSE-OpenStack-Cloud-9-2021-2818=1
  • SUSE OpenStack Cloud Crowbar 8
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-2818=1
  • SUSE OpenStack Cloud Crowbar 9
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-2818=1
  • Public Cloud Module 12
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2021-2818=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-2818=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
    zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP3 BCL 12-SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP3 ESPOS 12-SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-ESPOS-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP3 LTSS 12-SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-ESPOS-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-2818=1
  • SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2818=1
  • SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2818=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2818=1

Package List:

  • HPE Helion OpenStack 8 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE OpenStack Cloud 7 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE OpenStack Cloud 8 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE OpenStack Cloud 9 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE OpenStack Cloud Crowbar 8 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE OpenStack Cloud Crowbar 9 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • Public Cloud Module 12 (aarch64 ppc64le s390x x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP3 BCL 12-SP3 (x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP3 ESPOS 12-SP3 (aarch64 x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP3 LTSS 12-SP3 (aarch64 ppc64le s390x x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (aarch64 x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (aarch64 ppc64le s390x x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    • python-PyYAML-debuginfo-5.3.1-28.6.1
    • python-PyYAML-5.3.1-28.6.1
    • python3-PyYAML-debuginfo-5.3.1-28.6.1
    • python3-PyYAML-5.3.1-28.6.1
    • python-PyYAML-debugsource-5.3.1-28.6.1

References: