Bug 33996 - python-jinja2 new security issue CVE-2024-56326
Summary: python-jinja2 new security issue CVE-2024-56326
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2025-02-07 15:42 CET by Nicolas Salguero
Modified: 2025-02-12 07:38 CET (History)
3 users (show)

See Also:
Source RPM: python-jinja2-3.1.4-1.mga9.src.rpm
CVE: CVE-2024-56326
Status comment:


Attachments

Description Nicolas Salguero 2025-02-07 15:42:54 CET
RedHat has issued an advisory on February 7:
https://lwn.net/Articles/1008460/

Debian says:
Fixed by: https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4 (3.1.5)
Nicolas Salguero 2025-02-07 15:43:50 CET

Status comment: (none) => Fixed upstream in 3.1.5 and patch available from upstream
Source RPM: (none) => python-jinja2-3.1.4-1.mga10.src.rpm, python-jinja2-3.1.4-1.mga9.src.rpm
CVE: (none) => CVE-2024-56326
Whiteboard: (none) => MGA9TOO

Comment 1 Lewis Smith 2025-02-09 19:54:02 CET
The Debian URL shows the patch.

Assigning to Python group.

Assignee: bugsquad => python

Comment 2 Nicolas Salguero 2025-02-10 16:02:18 CET
For Cauldron, the build fails because of missing dependencies.
Comment 3 Nicolas Salguero 2025-02-10 16:04:30 CET
Suggested advisory:
========================

The updated package fixes a security vulnerability:

Jinja has a sandbox breakout through indirect reference to format method. (CVE-2024-56326)

References:
https://lwn.net/Articles/1008460/
========================

Updated package in core/updates_testing:
========================
python3-jinja2-3.1.5-1.mga9

from SRPM:
python-jinja2-3.1.5-1.mga9.src.rpm
Comment 4 David GEIGER 2025-02-10 20:04:35 CET
Cauldron now fixed!

CC: (none) => geiger.david68210
Version: Cauldron => 9
Whiteboard: MGA9TOO => (none)

Nicolas Salguero 2025-02-11 07:34:36 CET

Assignee: python => qa-bugs
Status: NEW => ASSIGNED
Status comment: Fixed upstream in 3.1.5 and patch available from upstream => (none)
Source RPM: python-jinja2-3.1.4-1.mga10.src.rpm, python-jinja2-3.1.4-1.mga9.src.rpm => python-jinja2-3.1.4-1.mga9.src.rpm

katnatek 2025-02-11 18:38:17 CET

Keywords: (none) => advisory

Comment 5 katnatek 2025-02-11 18:53:09 CET
RH x86_64

installing python3-jinja2-3.1.5-1.mga9.noarch.rpm from //home/katnatek/qa-testing/x86_64
Preparing...                     ##################################################################################################
      1/1: python3-jinja2        ##################################################################################################
      1/1: removing python3-jinja2-3.1.4-1.mga9.noarch
                                 ##################################################################################################

Run the test referenced in bug#28461 comment#7 (with corrections from previous round)

python jinja-test.py 
Hello. If you see this with no errors then it worked :)

Whiteboard: (none) => MGA9-64-OK
CC: (none) => andrewsfarm

Comment 6 Thomas Andrews 2025-02-11 20:59:56 CET
Validating.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 7 Mageia Robot 2025-02-12 07:38:28 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2025-0050.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.