Lucene search

K
redhatRedHatRHSA-2014:0748
HistoryJun 11, 2014 - 12:00 a.m.

(RHSA-2014:0748) Moderate: python33-python-jinja2 and python27-python-jinja2 security update

2014-06-1100:00:00
access.redhat.com
21

EPSS

0

Percentile

10.1%

Jinja2 is a template engine written in pure Python. It provides a
Django-inspired, non-XML syntax but supports inline expressions and an
optional sandboxed environment.

It was discovered that Jinja2 did not properly handle bytecode cache files
stored in the system’s temporary directory. A local attacker could use this
flaw to alter the output of an application using Jinja2 and
FileSystemBytecodeCache, and potentially execute arbitrary code with the
privileges of that application. (CVE-2014-1402)

All Jinja2 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. For the update to take
effect, all applications using Jinja2 must be restarted.