python-jinja2-2.10.1-3.el8
エラータID: AXSA:2021-2728:01
The python-jinja2 package contains Jinja2, a template engine written in pure
Python. Jinja2 provides a Django inspired non-XML syntax but supports inline
expressions and an optional sandboxed environment.
Security Fix(es):
* python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2020-28493
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS
vulnerability is mainly due to the `_punctuation_re regex` operator and its use
of multiple wildcards. The last wildcard is the most exploitable as it searches
for trailing punctuation. This issue can be mitigated by Markdown to format user
content instead of the urlize filter, or by implementing request timeouts and
limiting process memory.
Update packages.
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
N/A
SRPMS
- python-jinja2-2.10.1-3.el8.src.rpm
MD5: 21624c9765bde5d470a4e7018260d111
SHA-256: 3e8f8f82b2329a3f5c4d5acebf493b1c5d33789dc3de49839450429ee4e45dce
Size: 274.83 kB
Asianux Server 8 for x86_64
- python3-jinja2-2.10.1-3.el8.noarch.rpm
MD5: a5560de8b61a76f231f10b84c55f230a
SHA-256: 273511fbb54db029750579bf63556e12a4f1a986f3e4e4792bb1de28816846fb
Size: 536.50 kB