From 331d8423ad3e6854e75addfc1513aaf68ba57b21 Mon Sep 17 00:00:00 2001 From: Jenkins Date: Sun, 9 Apr 2017 14:54:37 +0000 Subject: [PATCH] Updated openstack/openstack Project: openstack/heat-templates 8dbb1e76c03e19d0f6fa99e80fc6ce6e493e1f45 Replace yaml.load() with yaml.safe_load() Yaml.load() return Python object may be dangerous if you receive a YAML document from an untrusted source such as the Internet. The function yaml.safe_load() limits this ability to simple Python objects like integers or lists. Reference: https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html Change-Id: Ib2bfd11354c6b35c90938c1075729dc7028236a3 --- heat-templates | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/heat-templates b/heat-templates index 7879033e7d..8dbb1e76c0 160000 --- a/heat-templates +++ b/heat-templates @@ -1 +1 @@ -Subproject commit 7879033e7dc8a43c79c17a8ab863ee4f1d26bbbc +Subproject commit 8dbb1e76c03e19d0f6fa99e80fc6ce6e493e1f45