First published: Tue Jun 19 2018(Updated: )
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linaro LAVA | <=2018.4 | |
Debian Debian Linux | =9.0 | |
debian/lava | 2019.01-5 2019.01-5+deb10u2 2020.12-5+deb11u2 2023.01-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12565 is a vulnerability in Linaro LAVA before 2018.5.post1 that allows remote code execution due to the use of yaml.load() instead of yaml.safe_load() when parsing user data.
CVE-2018-12565 has a severity rating of 8.8 (High).
CVE-2018-12565 affects Linaro LAVA versions up to 2018.4, Debian Debian Linux 9.0, and Debian package 'lava' versions 2019.01-5, 2019.01-5+deb10u2, 2020.12-5+deb11u2, and 2023.01-2.
To fix CVE-2018-12565, update your Linaro LAVA installation to version 2018.5.post1 or later, upgrade Debian Debian Linux to a version later than 9.0, or update the 'lava' package on Debian to a version later than the ones mentioned in the vulnerability details.
The Common Weakness Enumeration (CWE) ID for CVE-2018-12565 is CWE-20.