Security update for python-Pillow
Announcement ID: | SUSE-SU-2024:1673-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 12 vulnerabilities can now be installed.
Description:
This update for python-Pillow fixes the following issues:
- Fixed ImagePath.Path array handling (bsc#1194552, CVE-2022-22815, bsc#1194551, CVE-2022-22816)
- Use snprintf instead of sprintf (bsc#1188574, CVE-2021-34552)
- Fix Memory DOS in Icns, Ico and Blp Image Plugins. (bsc#1183110, CVE-2021-27921, bsc#1183108, CVE-2021-27922, bsc#1183107, CVE-2021-27923)
- Fix OOB read in SgiRleDecode.c (bsc#1183102, CVE-2021-25293)
- Use more specific regex chars to prevent ReDoS (bsc#1183101, CVE-2021-25292)
- Fix negative size read in TiffDecode.c (bsc#1183105, CVE-2021-25290)
- Raise ValueError if color specifier is too long (bsc#1190229, CVE-2021-23437)
- Incorrect error code checking in TiffDecode.c (bsc#1183103, CVE-2021-25289)
- OOB Write in TiffDecode.c (bsc#1180833, CVE-2020-35654)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1673=1
-
openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1673=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- python-Pillow-debugsource-7.2.0-150300.3.15.1
- python3-Pillow-tk-7.2.0-150300.3.15.1
- python-Pillow-debuginfo-7.2.0-150300.3.15.1
- python3-Pillow-7.2.0-150300.3.15.1
- python3-Pillow-debuginfo-7.2.0-150300.3.15.1
- python3-Pillow-tk-debuginfo-7.2.0-150300.3.15.1
-
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
- python-Pillow-debugsource-7.2.0-150300.3.15.1
- python3-Pillow-tk-7.2.0-150300.3.15.1
- python-Pillow-debuginfo-7.2.0-150300.3.15.1
- python3-Pillow-7.2.0-150300.3.15.1
- python3-Pillow-debuginfo-7.2.0-150300.3.15.1
- python3-Pillow-tk-debuginfo-7.2.0-150300.3.15.1
References:
- https://www.suse.com/security/cve/CVE-2020-35654.html
- https://www.suse.com/security/cve/CVE-2021-23437.html
- https://www.suse.com/security/cve/CVE-2021-25289.html
- https://www.suse.com/security/cve/CVE-2021-25290.html
- https://www.suse.com/security/cve/CVE-2021-25292.html
- https://www.suse.com/security/cve/CVE-2021-25293.html
- https://www.suse.com/security/cve/CVE-2021-27921.html
- https://www.suse.com/security/cve/CVE-2021-27922.html
- https://www.suse.com/security/cve/CVE-2021-27923.html
- https://www.suse.com/security/cve/CVE-2021-34552.html
- https://www.suse.com/security/cve/CVE-2022-22815.html
- https://www.suse.com/security/cve/CVE-2022-22816.html
- https://bugzilla.suse.com/show_bug.cgi?id=1180833
- https://bugzilla.suse.com/show_bug.cgi?id=1183101
- https://bugzilla.suse.com/show_bug.cgi?id=1183102
- https://bugzilla.suse.com/show_bug.cgi?id=1183103
- https://bugzilla.suse.com/show_bug.cgi?id=1183105
- https://bugzilla.suse.com/show_bug.cgi?id=1183107
- https://bugzilla.suse.com/show_bug.cgi?id=1183108
- https://bugzilla.suse.com/show_bug.cgi?id=1183110
- https://bugzilla.suse.com/show_bug.cgi?id=1188574
- https://bugzilla.suse.com/show_bug.cgi?id=1190229
- https://bugzilla.suse.com/show_bug.cgi?id=1194551
- https://bugzilla.suse.com/show_bug.cgi?id=1194552