Adding patchinfo patchinfo.20250106100805007247.269002615871826

This commit is contained in:
Adrian Schröter 2025-01-13 14:14:36 +01:00
parent 09872fca88
commit 4b42ebf183
3 changed files with 20 additions and 2 deletions

2
.gitmodules vendored
View File

@ -4275,7 +4275,7 @@
url = ../../pool/dmidecode
[submodule "dnsmasq"]
path = dnsmasq
url = ../../pool/dnsmasq
url = ../../ALP-pool/dnsmasq
[submodule "dosfstools"]
path = dosfstools
url = ../../pool/dosfstools

@ -1 +1 @@
Subproject commit db61ef1fd92bf8918ea1055752ddcf109cf75bd2
Subproject commit c2bdbf14134d21c4d3ba0a41c02e3030b00bd1aa

View File

@ -0,0 +1,18 @@
<patchinfo>
<!-- generated from request(s) 356857 -->
<issue tracker="bnc" id="1234808">VUL-0: CVE-2024-56201: python-Jinja2: sandbox breakout through malicious content and filename of a template</issue>
<issue tracker="bnc" id="1234809">VUL-0: CVE-2024-56326: python-Jinja2: sandbox breakout through indirect reference to format method</issue>
<issue tracker="cve" id="2024-56201"/>
<issue tracker="cve" id="2024-56326"/>
<packager>nkrapp</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-Jinja2</summary>
<description>This update for python-Jinja2 fixes the following issues:
- CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808)
- CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)
</description>
<package>python-Jinja2</package>
<seperate_build_arch/>
</patchinfo>