Yeting Li discovered that Jinja2 incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.8-1ubuntu0.1+esm1", "binary_name": "python-jinja2" }, { "binary_version": "2.8-1ubuntu0.1+esm1", "binary_name": "python-jinja2-doc" }, { "binary_version": "2.8-1ubuntu0.1+esm1", "binary_name": "python3-jinja2" } ] }