{"affected":[{"ecosystem_specific":{"binaries":[{"python-Jinja2":"2.8-19.31.1","python3-Jinja2":"2.8-19.31.1"}]},"package":{"ecosystem":"SUSE:Manager Client Tools 12","name":"python-Jinja2","purl":"pkg:rpm/suse/python-Jinja2&distro=SUSE%20Manager%20Client%20Tools%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.8-19.31.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python-Jinja2":"2.8-19.31.1","python3-Jinja2":"2.8-19.31.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 12","name":"python-Jinja2","purl":"pkg:rpm/suse/python-Jinja2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.8-19.31.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-Jinja2 fixes the following issues:\n\n- CVE-2024-56326: sandbox breakout through indirect reference to format method in template file. (bsc#1234809)\n","id":"SUSE-SU-2025:0016-1","modified":"2025-01-06T09:02:48Z","published":"2025-01-06T09:02:48Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250016-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56326"}],"related":["CVE-2024-56326"],"summary":"Security update for python-Jinja2","upstream":["CVE-2024-56326"]}