==========================================================================
Ubuntu Security Notice USN-4011-2
June 06, 2019
jinja2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in Jinja2.
Software Description:
– jinja2: small but fast and easy to use stand-alone template engine
Details:
USN-4011-1 fixed several vulnerabilities in Jinja2. This update
provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu
14.04 ESM.
Original advisory details:
Olivier Dony discovered that Jinja incorrectly handled str.format. An
attacker could possibly use this issue to escape the sandbox.
(CVE-2016-10745)
Brian Welch discovered that Jinja incorrectly handled str.format_map.
An attacker could possibly use this issue to escape the sandbox.
(CVE-2019-10906)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
python-jinja2 2.7.2-2ubuntu0.1~esm1
python3-jinja2 2.7.2-2ubuntu0.1~esm1
Ubuntu 12.04 ESM:
python-jinja2 2.6-1ubuntu0.2
python3-jinja2 2.6-1ubuntu0.2
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/4011-2
https://usn.ubuntu.com/4011-1
CVE-2016-10745, CVE-2019-10906—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=Mn60
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-4011-1
June 06, 2019
jinja2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Jinja2.
Software Description:
– jinja2: small but fast and easy to use stand-alone template engine
Details:
Olivier Dony discovered that Jinja incorrectly handled str.format. An
attacker could possibly use this issue to escape the sandbox. This issue
only affected Ubuntu 16.04 LTS. (CVE-2016-10745)
Brian Welch discovered that Jinja incorrectly handled str.format_map. An
attacker could possibly use this issue to escape the sandbox.
(CVE-2019-10906)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
python-jinja2 2.10-1ubuntu0.19.04.1
python3-jinja2 2.10-1ubuntu0.19.04.1
Ubuntu 18.10:
python-jinja2 2.10-1ubuntu0.18.10.1
python3-jinja2 2.10-1ubuntu0.18.10.1
Ubuntu 18.04 LTS:
python-jinja2 2.10-1ubuntu0.18.04.1
python3-jinja2 2.10-1ubuntu0.18.04.1
Ubuntu 16.04 LTS:
python-jinja2 2.8-1ubuntu0.1
python3-jinja2 2.8-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4011-1
CVE-2016-10745, CVE-2019-10906
Package Information:
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/jinja2/2.10-1ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/jinja2/2.8-1ubuntu0.1
—–BEGIN PGP SIGNATURE—–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=7S/M
—–END PGP SIGNATURE—–
—