SUSE_ALP_Standard/patchinfo.20240828152800311664.269002615871826/_patchinfo

17 lines
909 B
Plaintext

<patchinfo incident="37">
<!-- generated from request(s) 332831 -->
<issue tracker="bnc" id="1218722">VUL-0: CVE-2024-22195: python-Jinja2: HTML attribute injection when passing user input as keys to xmlattr filter</issue>
<issue tracker="bnc" id="1223980">VUL-0: CVE-2024-34064: python-Jinja2: HTML attribute injection when passing user input as keys to xmlattr filter</issue>
<issue tracker="cve" id="2024-22195"/>
<issue tracker="cve" id="2024-34064"/>
<packager>dgarcia</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for python-Jinja2</summary>
<description>This update for python-Jinja2 fixes the following issues:
- CVE-2024-34064, CVE-2024-22195: HTML attribute injection when passing user input as keys to xmlattr filter (bsc#1223980, bsc#1218722)
</description>
<package>python-Jinja2</package>
<seperate_build_arch/>
</patchinfo>