{"id":"ALSA-2024:3102","summary":"Moderate: python-jinja2 security update","details":"The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. \n\nSecurity Fix(es):\n\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T02:17:23.095719Z","published":"2024-05-22T00:00:00Z","related":["CVE-2024-22195"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3102"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-22195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257854"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-3102.html"}],"affected":[{"package":{"name":"python3-jinja2","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/python3-jinja2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10.1-4.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:3102.json"}}],"schema_version":"1.7.3"}