Lucene search

K
mageiaGentoo FoundationMGASA-2014-0159
HistoryApr 03, 2014 - 7:18 p.m.

Updated python-pillow packages fix insecure use of temporary files

2014-04-0319:18:48
Gentoo Foundation
advisories.mageia.org
13

0.001 Low

EPSS

Percentile

37.7%

Updated python-imaging packages fix security vulnerabilities: Jakub Wilk discovered that temporary files were insecurely created (via mktemp()) in the IptcImagePlugin.py, Image.py, JpegImagePlugin.py, and EpsImagePlugin.py files of Python Imaging Library. A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running an application that uses the Python Imaging Library (CVE-2014-1932). Jakub Wilk discovered that temporary files created in the JpegImagePlugin.py and EpsImagePlugin.py files of the Python Imaging Library were passed to an external process. These could be viewed on the command line, allowing an attacker to obtain the name and possibly perform symbolic link attacks, allowing them to modify an arbitrary file accessible to the user running an application that uses the Python Imaging Library (CVE-2014-1933).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchpython-pillow< 2.2.1-0.4python-pillow-2.2.1-0.4.mga4