Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in python-jinja2
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in python-jinja2
ID: FEDORA-2019-04a42e480b
Distribution: Fedora
Plattformen: Fedora 29
Datum: So, 28. April 2019, 08:54
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906
Applikationen: Jinja2

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-04a42e480b
2019-04-27 23:10:05.598045
-------------------------------------------------------------------------------
-

Name : python-jinja2
Product : Fedora 29
Version : 2.10.1
Release : 1.fc29
URL : http://jinja.pocoo.org/
Summary : General purpose template engine
Description :
Jinja2 is a template engine written in pure Python. It provides a
Django inspired non-XML syntax but supports inline expressions and an
optional sandboxed environment.

If you have any exposure to other text-based template languages, such
as Smarty or Django, you should feel right at home with Jinja2. It's
both designer and developer friendly by sticking to Python's
principles and adding functionality useful for templating
environments.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2019-10906.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Apr 10 2019 Thomas Moschny <thomas.moschny@gmx.de> - 2.10.1-1
- Update to 2.10.1.
- Update specfile.
* Wed Feb 27 2019 Phil Wyett <philwyett@kathenas.org> - 2.10-8
- Fix FTBS due to bad conditional
- Add version requirement for markupsafe
* Sat Feb 2 2019 Fedora Release Engineering <releng@fedoraproject.org> -
2.10-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1698839 - CVE-2019-10906 python-jinja2: str.format_map allows
sandbox escape
https://bugzilla.redhat.com/show_bug.cgi?id=1698839
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-04a42e480b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung