Jinja2 is vulnerable to elevation of privileges. Local users of Jinja2 are able to gain privileges by using a .cache file with a name starting with _jinja2 in the /tmp directory. This is only applicable with the default configuration for bccache.FileSystemBytecodeCache.
advisories.mageia.org/MGASA-2014-0028.html
jinja.pocoo.org/docs/changelog/
openwall.com/lists/oss-security/2014/01/10/2
openwall.com/lists/oss-security/2014/01/10/3
rhn.redhat.com/errata/RHSA-2014-0747.html
rhn.redhat.com/errata/RHSA-2014-0748.html
secunia.com/advisories/56287
secunia.com/advisories/58783
secunia.com/advisories/58918
secunia.com/advisories/59017
secunia.com/advisories/60738
secunia.com/advisories/60770
www.gentoo.org/security/en/glsa/glsa-201408-13.xml
www.mandriva.com/security/advisories?name=MDVSA-2014:096
access.redhat.com/security/updates/classification/#moderate
bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747
bugzilla.redhat.com/show_bug.cgi?id=1051421
oss.oracle.com/pipermail/el-errata/2014-June/004192.html
rhn.redhat.com/errata/RHSA-2014-0747.html