MGASA-2014-0476

Source
https://advisories.mageia.org/MGASA-2014-0476.html
Import Source
https://advisories.mageia.org/MGASA-2014-0476.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0476
Related
Published
2014-11-21T12:44:16Z
Modified
2014-11-21T12:21:53Z
Summary
Updated python-imaging and python-pillow packages fix security vulnerability
Details

Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters, due to an incomplete fix for CVE-2014-1932 (CVE-2014-3007).

References
Credits

Affected packages

Mageia:3 / python-imaging

Package

Name
python-imaging
Purl
pkg:rpm/mageia/python-imaging?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.7-7.3.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / python-pillow

Package

Name
python-pillow
Purl
pkg:rpm/mageia/python-pillow?arch=source&distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.1-0.6.mga4

Ecosystem specific

{
    "section": "core"
}