Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.851405
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for python-Jinja2 (openSUSE-SU-2016:2465-1)
Summary:The remote host is missing an update for the 'python-Jinja2'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'python-Jinja2'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This update for python-Jinja2 fixes the following issues:

Update to version 2.8:

- Added `target` parameter to urlize function.

- Added support for `followsymlinks` to the file system loader.

- The truncate filter now counts the length.

- Added equalto filter that helps with select filters.

- Changed cache keys to use absolute file names if available instead of
load names.

- Fixed loop length calculation for some iterators.

- Changed how Jinja2 enforces strings to be native strings in Python 2 to
work when people break their default encoding.

- Added :func:`make_logging_undefined` which returns an undefined
object that logs failures into a logger.

- If unmarshalling of cached data fails the template will be reloaded now.

- Implemented a block ``set`` tag.

- Default cache size was increased to 400 from a low 50.

- Fixed ``is number`` test to accept long integers in all Python versions.

- Changed ``is number`` to accept Decimal as a number.

- Added a check for default arguments followed by non-default arguments.
This change makes ``{% macro m(x, y=1, z) %}...{% endmacro %}`` a syntax
error. The previous behavior for this code was broken anyway (resulting
in the default value being applied to `y`).

- Add ability to use custom subclasses of
``jinja2.compiler.CodeGenerator`` and ``jinja2.runtime.Context`` by
adding two new attributes to the environment (`code_generator_class` and
`context_class`) (pull request ``#404``).

- added support for context/environment/evalctx decorator functions on the
finalize callback of the environment.

- escape query strings for urlencode properly. Previously slashes were
not escaped in that place.

- Add 'base' parameter to 'int' filter.

- Update to 2.7.3 (boo#858239, CVE-2014-0012)

Affected Software/OS:
python-Jinja2 on openSUSE 13.2

Solution:
Please install the updated package(s).

CVSS Score:
4.4

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-0012
56328
http://secunia.com/advisories/56328
60738
http://secunia.com/advisories/60738
GLSA-201408-13
http://www.gentoo.org/security/en/glsa/glsa-201408-13.xml
[oss-security] 20140110 CVE assignment for jinja2
http://seclists.org/oss-sec/2014/q1/73
https://bugzilla.redhat.com/show_bug.cgi?id=1051421
https://github.com/mitsuhiko/jinja2/commit/acb672b6a179567632e032f547582f30fa2f4aa7
https://github.com/mitsuhiko/jinja2/pull/292
https://github.com/mitsuhiko/jinja2/pull/296
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.