18 lines
962 B
Plaintext
18 lines
962 B
Plaintext
<patchinfo incident="184">
|
|
<!-- generated from request(s) 356857 -->
|
|
<issue tracker="bnc" id="1234808">VUL-0: CVE-2024-56201: python-Jinja2: sandbox breakout through malicious content and filename of a template</issue>
|
|
<issue tracker="bnc" id="1234809">VUL-0: CVE-2024-56326: python-Jinja2: sandbox breakout through indirect reference to format method</issue>
|
|
<issue tracker="cve" id="2024-56201"/>
|
|
<issue tracker="cve" id="2024-56326"/>
|
|
<packager>nkrapp</packager>
|
|
<rating>important</rating>
|
|
<category>security</category>
|
|
<summary>Security update for python-Jinja2</summary>
|
|
<description>This update for python-Jinja2 fixes the following issues:
|
|
|
|
- CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808)
|
|
- CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)
|
|
</description>
|
|
<package>python-Jinja2</package>
|
|
<seperate_build_arch/>
|
|
</patchinfo> |