| Package | Installed | Affected | Info |
|---|---|---|---|
| PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pydantic | 1.8.1 | >=1.8.0a1,<1.8.2 , >=1.7.0a0,<1.7.4 , <1.6.2 |
show Pydantic 1.8.2, 1.7.4 and 1.6.2 include a fix for CVE-2021-29510: In affected versions of Pydantic passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. |
| pydantic | 1.8.1 | <1.10.13 , >=2.0a1,<2.4.0 |
show Pydantic 1.10.13 and 2.4.0 include a fix for a regular expression denial of service vulnerability (REDoS). https://github.com/pydantic/pydantic/pull/7360 https://github.com/pydantic/pydantic/pull/7673 |
| pydantic | 1.8.1 | >=2.0.0,<2.4.0 , <1.10.13 |
show Regular expression denial of service in Pydanic affected versions allows remote attackers to cause denial of service via a crafted email string. |
| pydantic | 1.8.1 | <1.10.2 |
show Pydantic 1.10.2 prevents long strings as int inputs to fix CVE-2020-10735. https://github.com/pydantic/pydantic/commit/eccd85e4d012e70ffbd81f379179da900d4621c5 |
https://pyup.io/repos/github/irrdnet/irrd/python-3-shield.svg
[](https://pyup.io/repos/github/irrdnet/irrd/)
.. image:: https://pyup.io/repos/github/irrdnet/irrd/python-3-shield.svg
:target: https://pyup.io/repos/github/irrdnet/irrd/
:alt: Python 3
<a href="https://pyup.io/repos/github/irrdnet/irrd/"><img src="https://pyup.io/repos/github/irrdnet/irrd/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/irrdnet/irrd/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/irrdnet/irrd/
{<img src="https://pyup.io/repos/github/irrdnet/irrd/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/irrdnet/irrd/]
https://pyup.io/repos/github/irrdnet/irrd/shield.svg
[](https://pyup.io/repos/github/irrdnet/irrd/)
.. image:: https://pyup.io/repos/github/irrdnet/irrd/shield.svg
:target: https://pyup.io/repos/github/irrdnet/irrd/
:alt: Updates
<a href="https://pyup.io/repos/github/irrdnet/irrd/"><img src="https://pyup.io/repos/github/irrdnet/irrd/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/irrdnet/irrd/shield.svg(Updates)!:https://pyup.io/repos/github/irrdnet/irrd/
{<img src="https://pyup.io/repos/github/irrdnet/irrd/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/irrdnet/irrd/]