{"affected":[{"ecosystem_specific":{"binaries":[{"python311-Jinja2":"3.1.2-7.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"python-Jinja2","purl":"pkg:rpm/suse/python-Jinja2&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.2-7.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-Jinja2 fixes the following issues:\n\n- CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808)\n- CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)\n","id":"SUSE-SU-2025:20117-1","modified":"2025-02-03T09:21:01Z","published":"2025-02-03T09:21:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520117-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56326"}],"related":["CVE-2024-56201","CVE-2024-56326"],"summary":"Security update for python-Jinja2","upstream":["CVE-2024-56201","CVE-2024-56326"]}