Bug 28461

Summary: python-jinja2 new security issue CVE-2020-28493
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: andrewsfarm, geiger.david68210, herman.viaene, ouaurelien, sysadmin-bugs
Version: 8Keywords: advisory, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA7TOO MGA7-64-OK MGA8-64-OK
Source RPM: python-jinja2-2.11.2-2.mga8.src.rpm CVE: CVE-2020-28493
Status comment:

Description David Walser 2021-02-26 22:42:24 CET
SUSE has issued an advisory on February 25:
https://lists.suse.com/pipermail/sle-security-updates/2021-February/008376.html

The issue is fixed upstream in 2.11.3.

Mageia 7 and Mageia 8 are also affected.
David Walser 2021-02-26 22:42:42 CET

Status comment: (none) => Fixed upstream in 2.11.3
Whiteboard: (none) => MGA8TOO, MGA7TOO

Comment 1 Lewis Smith 2021-02-27 09:47:05 CET
Another one for you, David, as you did the last several version upgrades.

Assignee: bugsquad => geiger.david68210

Comment 2 David GEIGER 2021-02-27 11:06:27 CET
Done for cauldron, mga8 and mga7!
Comment 3 David Walser 2021-02-27 17:46:22 CET
Package list:
python2-jinja2-2.11.3-1.mga7
python3-jinja2-2.11.3-1.mga7
python3-jinja2-2.11.3-1.mga8

from SRPMS:
python-jinja2-2.11.3-1.mga7.src.rpm
python-jinja2-2.11.3-1.mga8.src.rpm

Status comment: Fixed upstream in 2.11.3 => (none)
CC: (none) => geiger.david68210
Whiteboard: MGA8TOO, MGA7TOO => MGA7TOO
Version: Cauldron => 8
Assignee: geiger.david68210 => qa-bugs

Comment 4 David Walser 2021-02-27 18:41:33 CET
Newer SUSE advisory from February 26:
https://lists.suse.com/pipermail/sle-security-updates/2021-February/008398.html

Nothing from openSUSE yet, but probably will be soon.
Comment 5 David Walser 2021-03-03 01:57:25 CET
Advisory:
========================

Updated python-jinja2 packages fix security vulnerability:

ReDOS vulnerability where urlize could have been called with untrusted user
data (CVE-2020-28493).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493
https://lists.suse.com/pipermail/sle-security-updates/2021-February/008398.html
Comment 6 Herman Viaene 2021-03-22 14:54:08 CET
MGA7-64 MATE on PeaqC1011
No installation issues.
This seems developer's stuff. Propose to OK on clean install.

CC: (none) => herman.viaene

Comment 7 Herman Viaene 2021-03-22 15:06:53 CET
Sorry, I didn't notice the procedure on bug 12265
$ python test.py 
Hello. If you see this with no errors then it worked :)

$ python3 test.py 
  File "test.py", line 4
    print output
               ^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(output)?
I changed the test.py to the suggestion and then
$ python3 test.py 
Hello. If you see this with no errors then it worked :)
and the first test on python works as well, so OK

Whiteboard: MGA7TOO => MGA7TOO MGA7-64-OK

Comment 8 Thomas Andrews 2021-04-07 03:01:30 CEST
Tested in mga8 64-bit Plasma mga8 guest.

No installation issues. Tried the test from Comment 7, with the same error. Corrected the file, ran again, this time successfully.

OK for mga8. Validating. Advisory in Comment 5.

Keywords: (none) => validated_update
Whiteboard: MGA7TOO MGA7-64-OK => MGA7TOO MGA7-64-OK MGA8-64-OK
CC: (none) => andrewsfarm, sysadmin-bugs

Aurelien Oudelet 2021-04-12 15:51:52 CEST

CC: (none) => ouaurelien
CVE: (none) => CVE-2020-28493
Keywords: (none) => advisory

Comment 9 Mageia Robot 2021-04-12 22:02:17 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0178.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED