First published: Wed Jan 29 2014(Updated: )
The (1) `load_djpeg` function in `JpegImagePlugin.py`, (2) `Ghostscript` function in `EpsImagePlugin.py`, (3) `load` function in `IptcImagePlugin.py`, and (4) `_copy` function in `Image.py` in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 | |
pip/pillow | <2.3.1 | 2.3.1 |
Python Imaging Library (Pillow) | <=2.3.0 | |
Python Imaging Library (PIL) | <=1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1932 has been classified as a moderate severity vulnerability.
To fix CVE-2014-1932, upgrade Pillow to version 2.3.1 or later.
CVE-2014-1932 affects Pillow versions earlier than 2.3.1.
CVE-2014-1932 impacts the Python Imaging Library (PIL) version 1.1.7 and earlier, as well as Pillow versions before 2.3.1.
Yes, CVE-2014-1932 is present in specific Debian releases of Pillow prior to version 8.1.2+dfsg-0.3+deb11u2.