Bug 57007 - jinja2: Multiple issues (5.0)
jinja2: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-6-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2024-01-29 08:03 CET by Quality Assurance
Modified: 2024-01-31 15:39 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-01-29 08:03:38 CET
New Debian jinja2 2.10-2+deb10u1 fixes:
This update addresses the following issue:
2.10-2+deb10u1 (Mon, 22 Jan 2024 12:57:18 -0800)
* Non-maintainer upload by the Debian LTS team.
* CVE-2024-22195: Fix an issue where it was possible to inject arbitrary HTML  attributes into the rendered HTML via the "xmlattr" filter, potentially  leading to a Cross-Site Scripting (XSS) attack. It may also have been  possible to bypass attribute validation checks if they were  blacklist-based.
* Actually run the testsuite, on both Python 2.x and Python 3.x.
Comment 1 Quality Assurance univentionstaff 2024-01-29 09:00:30 CET
--- mirror/ftp/pool/main/j/jinja2/jinja2_2.10-2.dsc
+++ apt/ucs_5.0-0-errata5.0-6/source/jinja2_2.10-2+deb10u1.dsc
@@ -1,3 +1,13 @@
+2.10-2+deb10u1 [Mon, 22 Jan 2024 12:57:18 -0800] Chris Lamb <lamby@debian.org>:
+
+  * Non-maintainer upload by the Debian LTS team.
+  * CVE-2024-22195: Fix an issue where it was possible to inject arbitrary HTML
+    attributes into the rendered HTML via the "xmlattr" filter, potentially
+    leading to a Cross-Site Scripting (XSS) attack. It may also have been
+    possible to bypass attribute validation checks if they were
+    blacklist-based. (Closes: #1060748)
+  * Actually run the testsuite, on both Python 2.x and Python 3.x.
+
 2.10-2 [Tue, 09 Apr 2019 21:58:20 +0200] Piotr Ożarowski <piotr@debian.org>:
 
   [ Thomas Goirand ]

<http://piuparts.knut.univention.de/5.0-6/#8367908690102894171>
Comment 2 Iván.Delgado univentionstaff 2024-01-30 09:08:36 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-6] 245fdd6ac0 Bug #57007: jinja2 2.10-2+deb10u1
 doc/errata/staging/jinja2.yaml | 11 ++++-------
 1 file changed, 4 insertions(+), 7 deletions(-)

[5.0-6] 0687f6227b Bug #57007: jinja2 2.10-2+deb10u1
 doc/errata/staging/jinja2.yaml | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)