[Bug 1385077] Re: module defaults to unsafe "load" function
Launchpad Bug Tracker
1385077 at bugs.launchpad.net
Fri Oct 24 08:26:44 UTC 2014
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: pyyaml (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to pyyaml in Ubuntu.
https://bugs.launchpad.net/bugs/1385077
Title:
module defaults to unsafe "load" function
Status in “pyyaml” package in Ubuntu:
Confirmed
Bug description:
The python-yaml module's load function is remarkably unsafe, allowing
yaml code to instantiate arbitrary python objects of arbitrary class
or type. Hidden away in the documentation is a safe_load() function,
which is the one nearly everyone wants to use to process yaml being
sent over the wire by heterogeneous systems or APIs.
Please make yaml.load call yaml.safe_load(), and give the other
function a name such as unsafe_load()
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: python-yaml 3.10-4build4
ProcVersionSignature: Ubuntu 3.13.0-38.65-generic 3.13.11.8
Uname: Linux 3.13.0-38-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
CurrentDesktop: Unity
Date: Fri Oct 24 08:15:29 2014
InstallationDate: Installed on 2014-05-29 (147 days ago)
InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
SourcePackage: pyyaml
UpgradeStatus: No upgrade log present (probably fresh install)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pyyaml/+bug/1385077/+subscriptions
More information about the foundations-bugs
mailing list