ALAS2-2023-2286

Related Vulnerabilities: CVE-2014-1932   CVE-2014-1933   CVE-2014-3007  

The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. (CVE-2014-1932) The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. (CVE-2014-1933) Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. (CVE-2014-3007)

ALAS2-2023-2286


Amazon Linux 2 Security Advisory: ALAS-2023-2286
Advisory Release Date: 2023-09-27 22:49 Pacific
Advisory Updated Date: 2023-10-05 22:24 Pacific
Severity: Important

Issue Overview:

The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. (CVE-2014-1932)

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. (CVE-2014-1933)

Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. (CVE-2014-3007)


Affected Packages:

python-pillow


Issue Correction:
Run yum update python-pillow to update your system.

New Packages:
aarch64:
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.8.aarch64

i686:
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.i686
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.8.i686
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.8.i686
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.8.i686
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.8.i686
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.8.i686

src:
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.src

x86_64:
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.8.x86_64