Описание
Security update for python-Jinja2
This update for python-Jinja2 fixes the following issues:
- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex backtracking. Email matching requires a word character at the start of the domain part, and only word characters in the TLD. (bsc#1181944)
Список пакетов
Image SLES12-SP4-Azure-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-EC2-HVM-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-GCE-BYOS
python-Jinja2-2.8-22.11.1
Image SLES12-SP4-OCI-BYOS
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-Azure
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-Azure-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-EC2-HVM
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-GCE-BYOS
python-Jinja2-2.8-22.11.1
Image SLES12-SP4-SAP-OCI-BYOS
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-Basic-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-HPC-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-HPC-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-SAP-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-SAP-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-Azure-Standard-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-EC2-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-EC2-ECS-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-EC2-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-EC2-SAP-BYOS
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-EC2-SAP-On-Demand
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-GCE-BYOS
python-Jinja2-2.8-22.11.1
Image SLES12-SP5-GCE-SAP-BYOS
python-Jinja2-2.8-22.11.1
Image SLES12-SP5-OCI-BYOS-BYOS
python3-Jinja2-2.8-22.11.1
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
python3-Jinja2-2.8-22.11.1
SUSE Linux Enterprise Point of Sale 12 SP2
python-Jinja2-2.8-22.11.1
python3-Jinja2-2.8-22.11.1
SUSE OpenStack Cloud 7
python-Jinja2-2.8-22.11.1
Ссылки
- Link for SUSE-SU-2021:0601-1
- E-Mail link for SUSE-SU-2021:0601-1
- SUSE Security Ratings
- SUSE Bug 1181944
- SUSE CVE CVE-2020-28493 page
Описание
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
Затронутые продукты
Image SLES12-SP4-Azure-BYOS:python-Jinja2-2.8-22.11.1
Image SLES12-SP4-Azure-BYOS:python3-Jinja2-2.8-22.11.1
Image SLES12-SP4-EC2-HVM-BYOS:python-Jinja2-2.8-22.11.1
Image SLES12-SP4-EC2-HVM-BYOS:python3-Jinja2-2.8-22.11.1
Ссылки
- CVE-2020-28493
- SUSE Bug 1181944