Multiple vulnerabilities have been found in Jinja2, allowing local attackers to escalate their privileges.
|Package||dev-python/jinja on all architectures|
|Affected versions||< 2.7.3|
|Unaffected versions||>= 2.7.3|
Jinja2 is a template engine written in pure Python.
Multiple vulnerabilities have been discovered in Jinja2. Please review the CVE identifiers referenced below for details.
A local attacker could gain escalated privileges via a specially crafted cache file or pre-created temporary directory.
There is no known workaround at this time.
All Jinja2 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.7.3"
August 29, 2014
August 29, 2014: 1