CVE-2014-1932
Publication date 21 February 2014
Last updated 24 July 2024
Ubuntu priority
The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
Status
Package | Ubuntu Release | Status |
---|---|---|
pillow | ||
python-imaging | ||
Notes
seth-arnold
Normally mktemp() mistakes are classed as 'low' because Ubuntu has hardlink and symlink protections in the kernel. However, one of the discovered flaws is almost certainly also a shell metacharacter injection problem.
References
Related Ubuntu Security Notices (USN)
- USN-2168-1
- Python Imaging Library vulnerabilities
- 15 April 2014