Ubuntu 5701-1: Jinja2 vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5701-1
October 26, 2022

jinja2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Jinja2 could be made to hang if it received specially crafted input.

Software Description:
- jinja2: small but fast and easy to use stand-alone template engine

Details:

Yeting Li discovered that Jinja2 incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
   python-jinja2                   2.8-1ubuntu0.1+esm1
   python3-jinja2                  2.8-1ubuntu0.1+esm1

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5701-1
   CVE-2020-28493

Ubuntu 5701-1: Jinja2 vulnerability

October 26, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Jinja2 could be made to hang if it received specially crafted input. Software Description: - jinja2: small but fast and easy to use stand-alone template engine Details: Yeting Li discovered that Jinja2 incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: python-jinja2 2.8-1ubuntu0.1+esm1 python3-jinja2 2.8-1ubuntu0.1+esm1 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5701-1

CVE-2020-28493

Severity
Ubuntu Security Notice USN-5701-1

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.