UbuntuUpdates.org

Package "python-jinja2"

Name: python-jinja2

Description:

small but fast and easy to use stand-alone template engine

Latest version: 2.10.1-2ubuntu0.4
Release: focal (20.04)
Level: updates
Repository: universe
Head package: jinja2
Homepage: http://jinja.pocoo.org/

Links


Download "python-jinja2"


Other versions of "python-jinja2" in Focal

Repository Area Version
base universe 2.10.1-2
security universe 2.10.1-2ubuntu0.4

Changelog

Version: 2.10.1-2ubuntu0.4 2025-01-30 05:06:48 UTC

  jinja2 (2.10.1-2ubuntu0.4) focal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution issue in jinja compiler
    - debian/patches/CVE-2024-56201.patch: f-string syntax handling in code
      generation improved in jinja2/compiler.py.
    - debian/patches/CVE-2024-56326.patch: oversight on calls to str.format
      adjusted in jinja2/sandbox.py.
    - CVE-2024-56201
    - CVE-2024-56326

 -- Evan Caville <email address hidden> Mon, 06 Jan 2025 15:47:03 +1000

Source diff to previous version
CVE-2024-56201 Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls
CVE-2024-56326 Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an a

Version: 2.10.1-2ubuntu0.3 2024-05-28 14:07:09 UTC

  jinja2 (2.10.1-2ubuntu0.3) focal-security; urgency=medium

  * SECURITY UPDATE: Cross-Site scripting in xmlattr filter
    - debian/patches/CVE-2024-34064.patch: disallow invalid characters
      in keys to xmlattr filter
    - CVE-2024-34064

 -- Nick Galanis <email address hidden> Tue, 21 May 2024 09:35:36 +0100

Source diff to previous version
CVE-2024-34064 Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HT

Version: 2.10.1-2ubuntu0.2 2024-01-25 19:12:26 UTC

  jinja2 (2.10.1-2ubuntu0.2) focal-security; urgency=medium

  * SECURITY UPDATE: regular expression DoS
    - debian/patches/CVE-2020-28493.patch: rewrite regex match for
      punctuation in urlize() in jinja2/utils.py.
    - CVE-2020-28493
  * SECURITY UPDATE: Cross-Site scripting
    - debian/patches/CVE-2024-22195.patch: disallow keys with spaces
      in jinja2/filters.py, tests/test_filters.py.
    - CVE-2024-22195

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 22 Jan 2024 07:14:05 -0300

CVE-2020-28493 This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its u
CVE-2024-22195 Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject



About   -   Send Feedback to @ubuntu_updates