You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa jinja2

Sigurnosni nedostaci programskog paketa jinja2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4011-2
June 06, 2019

jinja2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Jinja2.

Software Description:
– jinja2: small but fast and easy to use stand-alone template engine

Details:

USN-4011-1 fixed several vulnerabilities in Jinja2. This update
provides the corresponding update for Ubuntu 12.04 ESM  and Ubuntu
14.04 ESM.

Original advisory details:

 Olivier Dony discovered that Jinja incorrectly handled str.format. An
 attacker could possibly use this issue to escape the sandbox.
 (CVE-2016-10745)

 Brian Welch discovered that Jinja incorrectly handled str.format_map.
 An attacker could possibly use this issue to escape the sandbox.
 (CVE-2019-10906)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  python-jinja2                   2.7.2-2ubuntu0.1~esm1
  python3-jinja2                  2.7.2-2ubuntu0.1~esm1

Ubuntu 12.04 ESM:
  python-jinja2                   2.6-1ubuntu0.2
  python3-jinja2                  2.6-1ubuntu0.2

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/4011-2
  https://usn.ubuntu.com/4011-1
  CVE-2016-10745, CVE-2019-10906—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=Mn60
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4011-1
June 06, 2019

jinja2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Jinja2.

Software Description:
– jinja2: small but fast and easy to use stand-alone template engine

Details:

Olivier Dony discovered that Jinja incorrectly handled str.format. An
attacker could possibly use this issue to escape the sandbox. This issue
only affected Ubuntu 16.04 LTS. (CVE-2016-10745)

Brian Welch discovered that Jinja incorrectly handled str.format_map. An
attacker could possibly use this issue to escape the sandbox.
(CVE-2019-10906)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
python-jinja2 2.10-1ubuntu0.19.04.1
python3-jinja2 2.10-1ubuntu0.19.04.1

Ubuntu 18.10:
python-jinja2 2.10-1ubuntu0.18.10.1
python3-jinja2 2.10-1ubuntu0.18.10.1

Ubuntu 18.04 LTS:
python-jinja2 2.10-1ubuntu0.18.04.1
python3-jinja2 2.10-1ubuntu0.18.04.1

Ubuntu 16.04 LTS:
python-jinja2 2.8-1ubuntu0.1
python3-jinja2 2.8-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4011-1
CVE-2016-10745, CVE-2019-10906

Package Information:
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/jinja2/2.8-1ubuntu0.1

—–BEGIN PGP SIGNATURE—–
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=7S/M
—–END PGP SIGNATURE—–

AutorToni Vugdelija
Cert idNCERT-REF-2019-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa qpid-proton

Otkriven je sigurnosni nedostatak u programskom paketu qpid-proton za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje otkrivanje osjetljivih informacija...

Close