RedHat has issued an advisory on February 7: https://lwn.net/Articles/1008460/ Debian says: Fixed by: https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4 (3.1.5)
Status comment: (none) => Fixed upstream in 3.1.5 and patch available from upstreamSource RPM: (none) => python-jinja2-3.1.4-1.mga10.src.rpm, python-jinja2-3.1.4-1.mga9.src.rpmCVE: (none) => CVE-2024-56326Whiteboard: (none) => MGA9TOO
The Debian URL shows the patch. Assigning to Python group.
Assignee: bugsquad => python
For Cauldron, the build fails because of missing dependencies.
Suggested advisory: ======================== The updated package fixes a security vulnerability: Jinja has a sandbox breakout through indirect reference to format method. (CVE-2024-56326) References: https://lwn.net/Articles/1008460/ ======================== Updated package in core/updates_testing: ======================== python3-jinja2-3.1.5-1.mga9 from SRPM: python-jinja2-3.1.5-1.mga9.src.rpm
Cauldron now fixed!
CC: (none) => geiger.david68210Version: Cauldron => 9Whiteboard: MGA9TOO => (none)
Assignee: python => qa-bugsStatus: NEW => ASSIGNEDStatus comment: Fixed upstream in 3.1.5 and patch available from upstream => (none)Source RPM: python-jinja2-3.1.4-1.mga10.src.rpm, python-jinja2-3.1.4-1.mga9.src.rpm => python-jinja2-3.1.4-1.mga9.src.rpm
Keywords: (none) => advisory
RH x86_64 installing python3-jinja2-3.1.5-1.mga9.noarch.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ################################################################################################## 1/1: python3-jinja2 ################################################################################################## 1/1: removing python3-jinja2-3.1.4-1.mga9.noarch ################################################################################################## Run the test referenced in bug#28461 comment#7 (with corrections from previous round) python jinja-test.py Hello. If you see this with no errors then it worked :)
Whiteboard: (none) => MGA9-64-OKCC: (none) => andrewsfarm
Validating.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2025-0050.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED