Adding patchinfo patchinfo.20250106100805007247.269002615871826
This commit is contained in:
parent
09872fca88
commit
4b42ebf183
2
.gitmodules
vendored
2
.gitmodules
vendored
@ -4275,7 +4275,7 @@
|
||||
url = ../../pool/dmidecode
|
||||
[submodule "dnsmasq"]
|
||||
path = dnsmasq
|
||||
url = ../../pool/dnsmasq
|
||||
url = ../../ALP-pool/dnsmasq
|
||||
[submodule "dosfstools"]
|
||||
path = dosfstools
|
||||
url = ../../pool/dosfstools
|
||||
|
2
dnsmasq
2
dnsmasq
@ -1 +1 @@
|
||||
Subproject commit db61ef1fd92bf8918ea1055752ddcf109cf75bd2
|
||||
Subproject commit c2bdbf14134d21c4d3ba0a41c02e3030b00bd1aa
|
18
patchinfo.20250106100805007247.269002615871826/_patchinfo
Normal file
18
patchinfo.20250106100805007247.269002615871826/_patchinfo
Normal file
@ -0,0 +1,18 @@
|
||||
<patchinfo>
|
||||
<!-- generated from request(s) 356857 -->
|
||||
<issue tracker="bnc" id="1234808">VUL-0: CVE-2024-56201: python-Jinja2: sandbox breakout through malicious content and filename of a template</issue>
|
||||
<issue tracker="bnc" id="1234809">VUL-0: CVE-2024-56326: python-Jinja2: sandbox breakout through indirect reference to format method</issue>
|
||||
<issue tracker="cve" id="2024-56201"/>
|
||||
<issue tracker="cve" id="2024-56326"/>
|
||||
<packager>nkrapp</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for python-Jinja2</summary>
|
||||
<description>This update for python-Jinja2 fixes the following issues:
|
||||
|
||||
- CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808)
|
||||
- CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)
|
||||
</description>
|
||||
<package>python-Jinja2</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
Loading…
x
Reference in New Issue
Block a user