drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in python-jinja2
Name: |
Ausführen beliebiger Kommandos in python-jinja2 |
|
ID: |
FEDORA-2019-e41e19457b |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 30 |
|
Datum: |
Sa, 27. April 2019, 23:58 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906 |
|
Applikationen: |
Jinja2 |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2019-e41e19457b 2019-04-27 21:22:10.072692 ------------------------------------------------------------------------------- -
Name : python-jinja2 Product : Fedora 30 Version : 2.10.1 Release : 1.fc30 URL : http://jinja.pocoo.org/ Summary : General purpose template engine Description : Jinja2 is a template engine written in pure Python. It provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
If you have any exposure to other text-based template languages, such as Smarty or Django, you should feel right at home with Jinja2. It's both designer and developer friendly by sticking to Python's principles and adding functionality useful for templating environments.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2019-10906. ------------------------------------------------------------------------------- - ChangeLog:
* Wed Apr 10 2019 Thomas Moschny <thomas.moschny@gmx.de> - 2.10.1-1 - Update to 2.10.1. - Update specfile. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1698839 - CVE-2019-10906 python-jinja2: str.format_map allows sandbox escape https://bugzilla.redhat.com/show_bug.cgi?id=1698839 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-e41e19457b' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
|
|
|
|