From 4f7204fd988fa2700df7fb33f0cc91ced1d0789c Mon Sep 17 00:00:00 2001 From: Alex Clark Date: Thu, 14 Mar 2024 17:03:09 -0400 Subject: [PATCH] 80 char wrap + file name tick for #7864 --- docs/releasenotes/2.3.1.rst | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/docs/releasenotes/2.3.1.rst b/docs/releasenotes/2.3.1.rst index 4b58d037036..6446ebccbff 100644 --- a/docs/releasenotes/2.3.1.rst +++ b/docs/releasenotes/2.3.1.rst @@ -4,14 +4,23 @@ Security ======== -These issues reported in `Debian bug #737059 `_. +These issues reported in +`Debian bug #737059 `_. :cve:`2014-1932`: Fix insecure use of :py:func:`tempfile.mktemp` ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. +The (1) load_djpeg function in ``JpegImagePlugin.py``, (2) Ghostscript function +in EpsImagePlugin.py, (3) load function in ``IptcImagePlugin.py``, and (4) _copy +function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and +Pillow before 2.3.1 do not properly create temporary files, which allow local +users to overwrite arbitrary files and obtain sensitive information via a +symlink attack on the temporary file. :cve:`2014-1933`: Fix insecure use of :py:func:`tempfile.mktemp` ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. +The (1) ``JpegImagePlugin.py`` and (2) ``EpsImagePlugin.py`` scripts in Python +Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of +temporary files on the command line, which makes it easier for local users to +conduct symlink attacks by listing the processes.