First published: Thu Jun 06 2019(Updated: )
USN-4011-1 fixed several vulnerabilities in Jinja2. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Olivier Dony discovered that Jinja incorrectly handled str.format. An attacker could possibly use this issue to escape the sandbox. (CVE-2016-10745) Brian Welch discovered that Jinja incorrectly handled str.format_map. An attacker could possibly use this issue to escape the sandbox. (CVE-2019-10906)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-jinja2 | <2.7.2-2ubuntu0.1~esm1 | 2.7.2-2ubuntu0.1~esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/python3-jinja2 | <2.7.2-2ubuntu0.1~esm1 | 2.7.2-2ubuntu0.1~esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/python-jinja2 | <2.6-1ubuntu0.2 | 2.6-1ubuntu0.2 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/python3-jinja2 | <2.6-1ubuntu0.2 | 2.6-1ubuntu0.2 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jinja2 vulnerabilities is USN-4011-2.
The severity of USN-4011-2 is not specified.
USN-4011-2 affects Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
To fix the Jinja2 vulnerabilities, update the python-jinja2 and python3-jinja2 packages to the specified versions.
You can find more information about USN-4011-2 on the Ubuntu security website.