First published: Wed Jan 29 2014(Updated: )
The (1) `load_djpeg` function in `JpegImagePlugin.py`, (2) `Ghostscript` function in `EpsImagePlugin.py`, (3) `load` function in `IptcImagePlugin.py`, and (4) `_copy` function in `Image.py` in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pillow | <2.3.1 | 2.3.1 |
Python Pillow | <=2.3.0 | |
Pythonware Python Imaging Library | <=1.1.7 | |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 | |
<=2.3.0 | ||
<=1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.