{"affected":[{"ecosystem_specific":{"binaries":[{"python311-Jinja2":"3.1.2-6.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"python-Jinja2","purl":"pkg:rpm/suse/python-Jinja2&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.2-6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-Jinja2 fixes the following issues:\n\n- CVE-2024-34064, CVE-2024-22195: HTML attribute injection when passing user input as keys to xmlattr filter (bsc#1223980, bsc#1218722)\n","id":"SUSE-SU-2025:20035-1","modified":"2025-02-03T08:53:00Z","published":"2025-02-03T08:53:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520035-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-22195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-34064"}],"related":["CVE-2024-22195","CVE-2024-34064"],"summary":"Security update for python-Jinja2","upstream":["CVE-2024-22195","CVE-2024-34064"]}