CVE-2018-12565

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-12565
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-12565.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-12565
Related
Published
2018-06-19T05:29:00Z
Modified
2025-01-14T08:51:04.449110Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.

References

Affected packages

Debian:11 / lava

Package

Name
lava
Purl
pkg:deb/debian/lava?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2018.5.post1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lava

Package

Name
lava
Purl
pkg:deb/debian/lava?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2018.5.post1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/linaro/lava-server

Affected ranges

Type
GIT
Repo
https://github.com/linaro/lava-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2013.*

2013.12
2013.12.1

2014.*

2014.01
2014.02
2014.03
2014.04
2014.05
2014.06
2014.06.22
2014.06.24
2014.07
2014.07.1
2014.08
2014.08.1
2014.08.2
2014.09
2014.09.1
2014.12

2015.*

2015.01
2015.03
2015.03.1
2015.04
2015.04.1
2015.05
2015.06
2015.07
2015.11
2015.12
2015.8
2015.8.1
2015.9

2016.*

2016.11
2016.11.post1
2016.12
2016.2
2016.3
2016.3.post1
2016.4
2016.4.post1
2016.6
2016.8
2016.9

2017.*

2017.1
2017.10
2017.11
2017.11.post1
2017.12
2017.12.post1
2017.2
2017.4
2017.5
2017.6
2017.7
2017.9

2018.*

2018.1
2018.1.post1
2018.2
2018.4