|Description||Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|pillow (PTS)||buster, buster (security)||5.4.1-2+deb10u3||fixed|
|bullseye, bullseye (security)||8.1.2+dfsg-0.3+deb11u1||fixed|
The information below is based on the following data on fixed versions.
[squeeze] - python-imaging <no-dsa> (Minor issue)
[wheezy] - python-imaging <no-dsa> (Minor issue)
details what is covered exactly by this CVE relating to CVE-2014-1932 and CVE-2014-1933 is missing