~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-1933

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2014-02-21
2
 
Candidate: CVE-2014-1933
3
 
PublicDate: 2014-04-17
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933
6
 
 https://usn.ubuntu.com/usn/usn-2168-1
7
 
Description:
8
 
 The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python
9
 
 Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the
10
 
 names of temporary files on the command line, which makes it easier for
11
 
 local users to conduct symlink attacks by listing the processes.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
 sarnold> See also CVE-2014-1932
15
 
 mdeslaur> same patch as CVE-2014-1932
16
 
Bugs:
17
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
18
 
Priority: medium
19
 
Discovered-by: 
20
 
Assigned-to: mdeslaur
21
 
 
22
 
Patches_pillow:
23
 
upstream_pillow: needed
24
 
lucid_pillow: DNE
25
 
precise_pillow: DNE
26
 
quantal_pillow: DNE
27
 
saucy_pillow: DNE
28
 
devel_pillow: released (2.3.0-1ubuntu3)
29
 
 
30
 
Patches_python-imaging:
31
 
 upstream: https://github.com/wiredfool/Pillow/commit/a549e77bd8219a75ac745dcecc09cb963b4032a6 (bp)
32
 
 upstream: https://github.com/wiredfool/Pillow/commit/1e331e3e6a40141ca8eee4f5da9f74e895423b66
33
 
upstream_python-imaging: needed
34
 
lucid_python-imaging: released (1.1.7-1ubuntu0.2)
35
 
precise_python-imaging: released (1.1.7-4ubuntu0.12.04.1)
36
 
quantal_python-imaging: released (1.1.7-4ubuntu0.12.10.1)
37
 
saucy_python-imaging: released (1.1.7+2.0.0-1ubuntu1.1)
38
 
devel_python-imaging: DNE