Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in python-jinja2
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in python-jinja2
ID: FEDORA-2019-e41e19457b
Distribution: Fedora
Plattformen: Fedora 30
Datum: Sa, 27. April 2019, 23:58
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906
Applikationen: Jinja2

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-e41e19457b
2019-04-27 21:22:10.072692
-------------------------------------------------------------------------------
-

Name : python-jinja2
Product : Fedora 30
Version : 2.10.1
Release : 1.fc30
URL : http://jinja.pocoo.org/
Summary : General purpose template engine
Description :
Jinja2 is a template engine written in pure Python. It provides a
Django inspired non-XML syntax but supports inline expressions and an
optional sandboxed environment.

If you have any exposure to other text-based template languages, such
as Smarty or Django, you should feel right at home with Jinja2. It's
both designer and developer friendly by sticking to Python's
principles and adding functionality useful for templating
environments.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2019-10906.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Apr 10 2019 Thomas Moschny <thomas.moschny@gmx.de> - 2.10.1-1
- Update to 2.10.1.
- Update specfile.
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1698839 - CVE-2019-10906 python-jinja2: str.format_map allows
sandbox escape
https://bugzilla.redhat.com/show_bug.cgi?id=1698839
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-e41e19457b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung