From 71b5ca4be4166253a9254ff688cbf2963640c19bf8300f5828db5f85bfa62940 Mon Sep 17 00:00:00 2001 From: Thomas Bechtold Date: Tue, 30 Apr 2019 03:47:17 +0000 Subject: [PATCH] - update to version 2.10.1 (bsc#1132323, CVE-2019-10906, bsc#1125815, CVE-2019-8341): OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-Jinja2?expand=0&rev=69 --- python-Jinja2.changes | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/python-Jinja2.changes b/python-Jinja2.changes index 00521d2..6592ad5 100644 --- a/python-Jinja2.changes +++ b/python-Jinja2.changes @@ -6,7 +6,7 @@ Sat Apr 13 16:46:23 UTC 2019 - Jan Engelhardt ------------------------------------------------------------------- Sat Apr 13 03:06:31 UTC 2019 - Arun Persaud -- update to version 2.10.1 (bsc#1132323, CVE-2019-10906): +- update to version 2.10.1 (bsc#1132323, CVE-2019-10906, bsc#1125815, CVE-2019-8341): * "SandboxedEnvironment" securely handles "str.format_map" in order to prevent code execution through untrusted format strings. The sandbox already handled "str.format".