{"affected":[{"ecosystem_specific":{"binaries":[{"python311-Jinja2":"3.1.4-slfo.1.1_2.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"python-Jinja2","purl":"pkg:rpm/suse/python-Jinja2&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.4-slfo.1.1_2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-Jinja2 fixes the following issues:\n\n- CVE-2025-27516: Fixed Jinja sandbox breakout through attr filter selecting format method  (bsc#1238879)\n- CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template  (bsc#1234808)\n- CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)\n\n","id":"SUSE-SU-2025:20254-1","modified":"2025-03-28T13:55:43Z","published":"2025-03-28T13:55:43Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520254-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56326"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-27516"}],"related":["CVE-2024-56201","CVE-2024-56326","CVE-2025-27516"],"summary":"Security update for python-Jinja2","upstream":["CVE-2024-56201","CVE-2024-56326","CVE-2025-27516"]}