-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PyYAML is vulnerable #3828
Comments
We do not use |
@stealthycoin but we use and having |
Are you planning to update anyway the pinning the the not vulnerable version of PyYAML? It would solve also for us the update of dependencies and security checks of our project. |
@stealthycoin we're waiting for an update as well. It's blocking our security checks as well. |
BTW one way to mitigate is to pin PyYAML version to 4.2b1 before installing awscli. |
So another thing to keep in mind is that version of Given we do not load with the unsafe loader, I think we will have to wait until |
@kyleknap awesome. thanks for the information. Personally I'm good with the mitigation path outlined in my previous comment so my PR won't get blocked by our security scans. |
The problem is it doesn't go through pip-compile, which has the purpose of avoiding exactly this... |
The latest stable release of PyYAML (5.1) after 3.13 has dropped support for Python2.6, which I believe is a problem for this project (see #3660), and will likely delay moving forward on this dependency. 8( |
Just a question - what is the concern (if any) about relaxing the the restriction on This would allow host applications to specify a non-vulnerable version of I'm not very familiar with how EDIT: It looks like a similar approach is already being considered in #4015. I should have dug a bit deeper! |
Fixes security issues with Jinja2, urllib3, pyyaml. Raises an error when installing pyyaml==5.1 due to pinned constraints in docker-compose and aws-cli. AWS-cli has issues w pyyaml 5 dropping support for python 2.6 aws/aws-cli#3828 Docker compose is still waiting on some issues w unicode support in pyyaml 5.1, but this doesn't affect us. docker/compose#6623
May I ask why is this still blocked? It looks like #4015 has a provision for allowing Python 2.6 users to stay with a compatible version of PyYAML (3.13), while allowing Python 2.7+ users to finally move to a newer version of PyYAML (5.1). Can the solution in #4015 be merged, and then track the issue of Python 2.6 users still having a vulnerable PyYAML dependency in a new issue? |
Most current linux distributions ship newer versions than the current dependencies permit of: * colorama (only used/required on Windows) * rsa (e.g. 4.0, which doesn't support python 2.6) * PyYAML (e.g. 5.1 which doesn't support python 2.6) This change makes the legacy dependencies only take effect on those legacy platforms that can't use the modern versions. Fixes aws#3660 Fixes aws#3828
The currently used [email protected] contains a Arbitrary Code Execution issue. Check https://app.snyk.io/vuln/SNYK-PYTHON-PYYAML-42159 and https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342 for more information. (Just as reference for the duplicate issue I added here: #4193) |
(Edit: this was a mistaken belief generated by a CI workaround that was watching for this issue to be closed, not watching the pin itself...) |
Closing this as we are currently pinning to <5.2 now. |
Current version is
Should be updated to 4.1b4 or higher
https://nvd.nist.gov/vuln/detail/CVE-2017-18342
The text was updated successfully, but these errors were encountered: