Security update for python-Pillow
Announcement ID: | SUSE-SU-2021:1939-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 10 vulnerabilities can now be installed.
Description:
This update for python-Pillow fixes the following issues:
- CVE-2021-25292: Fixed a backtracking regex in PDF parser could be used as a DOS attack (bsc#1183101).
- CVE-2021-25290: Fixed a negative-offset memcpy with an invalid size in TiffDecode.c (bsc#1183105).
- CVE-2021-27922,CVE-2021-27923: Fixed improper reported size of a contained image (bsc#1183108,bsc#1183107)
- CVE-2020-35653: Fixed buffer over-read in PcxDecode when decoding a crafted PCX file (bsc#1180834).
- CVE-2021-25287: Fixed out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805).
- CVE-2021-25288: Fixed out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803).
- CVE-2021-28675: Fixed DoS in PsdImagePlugin (bsc#1185804).
- CVE-2021-28677: Fixed DoS in the open phase via a malicious EPS file (bsc#1185785).
- CVE-2021-28676: Fixed infinite loop in FliDecode.c (bsc#1185786).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
HPE Helion OpenStack 8
zypper in -t patch HPE-Helion-OpenStack-8-2021-1939=1
-
SUSE OpenStack Cloud 8
zypper in -t patch SUSE-OpenStack-Cloud-8-2021-1939=1
-
SUSE OpenStack Cloud Crowbar 8
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-1939=1
Package List:
-
HPE Helion OpenStack 8 (x86_64)
- python-Pillow-debuginfo-4.2.1-3.14.1
- python-Pillow-4.2.1-3.14.1
- python-Pillow-debugsource-4.2.1-3.14.1
-
SUSE OpenStack Cloud 8 (x86_64)
- python-Pillow-debuginfo-4.2.1-3.14.1
- python-Pillow-4.2.1-3.14.1
- python-Pillow-debugsource-4.2.1-3.14.1
-
SUSE OpenStack Cloud Crowbar 8 (x86_64)
- python-Pillow-debuginfo-4.2.1-3.14.1
- python-Pillow-4.2.1-3.14.1
- python-Pillow-debugsource-4.2.1-3.14.1
References:
- https://www.suse.com/security/cve/CVE-2020-35653.html
- https://www.suse.com/security/cve/CVE-2021-25287.html
- https://www.suse.com/security/cve/CVE-2021-25288.html
- https://www.suse.com/security/cve/CVE-2021-25290.html
- https://www.suse.com/security/cve/CVE-2021-25292.html
- https://www.suse.com/security/cve/CVE-2021-27922.html
- https://www.suse.com/security/cve/CVE-2021-27923.html
- https://www.suse.com/security/cve/CVE-2021-28675.html
- https://www.suse.com/security/cve/CVE-2021-28676.html
- https://www.suse.com/security/cve/CVE-2021-28677.html
- https://bugzilla.suse.com/show_bug.cgi?id=1180834
- https://bugzilla.suse.com/show_bug.cgi?id=1183101
- https://bugzilla.suse.com/show_bug.cgi?id=1183105
- https://bugzilla.suse.com/show_bug.cgi?id=1183107
- https://bugzilla.suse.com/show_bug.cgi?id=1183108
- https://bugzilla.suse.com/show_bug.cgi?id=1185785
- https://bugzilla.suse.com/show_bug.cgi?id=1185786
- https://bugzilla.suse.com/show_bug.cgi?id=1185803
- https://bugzilla.suse.com/show_bug.cgi?id=1185804
- https://bugzilla.suse.com/show_bug.cgi?id=1185805