Jinja2 is a template engine written in pure Python.
Multiple vulnerabilities have been discovered in Jinja2. Please review the CVE identifiers referenced below for details.
A local attacker could gain escalated privileges via a specially crafted cache file or pre-created temporary directory.
There is no known workaround at this time.
All Jinja2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/jinja-2.7.3"