USN-6599-1: Jinja2 vulnerabilities
25 January 2024
Several security issues were fixed in jinja2.
Releases
Packages
- jinja2 - small but fast and easy to use stand-alone template engine
Details
Yeting Li discovered that Jinja incorrectly handled certain regex.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and
Ubuntu 20.04 LTS. (CVE-2020-28493)
It was discovered that Jinja incorrectly handled certain HTML passed with
xmlatter filter. An attacker could inject arbitrary HTML attributes
keys and values potentially leading to XSS. (CVE-2024-22195)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
python-jinja2
-
2.10-1ubuntu0.18.04.1+esm1
Available with Ubuntu Pro
-
python3-jinja2
-
2.10-1ubuntu0.18.04.1+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
python-jinja2
-
2.8-1ubuntu0.1+esm2
Available with Ubuntu Pro
-
python3-jinja2
-
2.8-1ubuntu0.1+esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
python-jinja2
-
2.7.2-2ubuntu0.1~esm2
Available with Ubuntu Pro
-
python3-jinja2
-
2.7.2-2ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5701-1: jinja2, python-jinja2-doc, python-jinja2, python3-jinja2