File _patchinfo of Package patchinfo.14647

<patchinfo incident="14647">
  <issue tracker="bnc" id="1165439">VUL-0: CVE-2020-1747: python-PyYAML: PyYAML: arbitrary command execution through python/object/new when FullLoader is used</issue>
  <issue tracker="cve" id="2020-1747"/>
  <packager>tinita</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for python-PyYAML</summary>
  <description>This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
</description>
</patchinfo>
openSUSE Build Service is sponsored by