Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Jinja2
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Jinja2
ID: USN-7244-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Do, 30. Januar 2025, 08:00
Referenzen: https://www.cve.org/CVERecord?id=CVE-2024-56201
https://www.cve.org/CVERecord?id=CVE-2024-56326
https://launchpad.net/ubuntu/+source/jinja2/3.1.3-1ubuntu1.24.10.1
Applikationen: Jinja2

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8675191443698072356==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------b4cdni9GNd4Iof51QIJZlxpa"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------b4cdni9GNd4Iof51QIJZlxpa
Content-Type: multipart/mixed;
boundary="------------0wezUoP7HEeGj3HwLofys0yy";
protected-headers="v1"
From: Evan Caville <evan.caville@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <ef72c926-1960-4043-b1a8-bfa35091044d@canonical.com>
Subject: [USN-7244-1] Jinja2 vulnerabilities

--------------0wezUoP7HEeGj3HwLofys0yy
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7244-1
January 30, 2025

jinja2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in jinja2.

Software Description:
- jinja2: small but fast and easy to use stand-alone template engine

Details:

It was discovered that Jinja2 incorrectly handled certain filenames when
compiling template content. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2024-56201)

It was discovered that Jinja2 incorrectly handled string formatting calls.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-56326)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  python3-jinja2                  3.1.3-1ubuntu1.24.10.1

Ubuntu 24.04 LTS
  python3-jinja2                  3.1.2-1ubuntu1.2

Ubuntu 22.04 LTS
  python3-jinja2                  3.0.3-1ubuntu0.3

Ubuntu 20.04 LTS
  python-jinja2                   2.10.1-2ubuntu0.4
  python3-jinja2                  2.10.1-2ubuntu0.4

Ubuntu 18.04 LTS
  python-jinja2                   2.10-1ubuntu0.18.04.1+esm3
                                  Available with Ubuntu Pro
  python3-jinja2                  2.10-1ubuntu0.18.04.1+esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7244-1
  CVE-2024-56201, CVE-2024-56326

Package Information:
https://launchpad.net/ubuntu/+source/jinja2/3.1.3-1ubuntu1.24.10.1
  https://launchpad.net/ubuntu/+source/jinja2/3.1.2-1ubuntu1.2
  https://launchpad.net/ubuntu/+source/jinja2/3.0.3-1ubuntu0.3
  https://launchpad.net/ubuntu/+source/jinja2/2.10.1-2ubuntu0.4

--------------0wezUoP7HEeGj3HwLofys0yy--

--------------b4cdni9GNd4Iof51QIJZlxpa
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=k1Z6
-----END PGP SIGNATURE-----

--------------b4cdni9GNd4Iof51QIJZlxpa--


--===============8675191443698072356==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============8675191443698072356==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung