Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15
patchinfo.11092
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.11092
<patchinfo incident="11092"> <issue tracker="bnc" id="1132174">VUL-0: CVE-2016-10745: python-Jinja2: Sandbox escape due to information disclosure via str.format</issue> <issue tracker="bnc" id="1132323">VUL-0: CVE-2019-10906: python-Jinja2: Sandbox escape due to information disclosure via str.format</issue> <issue tracker="bnc" id="1125815">VUL-0: CVE-2019-8341: python-Jinja2: command injection in function from_string</issue> <issue tracker="cve" id="2016-10745"/> <issue tracker="cve" id="2019-10906"/> <issue tracker="cve" id="2019-8341"/> <packager>tbechtold</packager> <rating>important</rating> <category>security</category> <summary>Security update for python-Jinja2</summary> <description>This update for python-Jinja2 to version 2.10.1 fixes the following issues: Security issues fixed: - CVE-2019-8341: Fixed a command injection in from_string() (bsc#1125815). - CVE-2019-10906: Fixed a sandbox escape due to information disclosure via str.format (bsc#1132323). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor