Advisories ยป MGASA-2021-0389

Updated python-pillow packages fix security vulnerabilities

Publication date: 06 Aug 2021
Modification date: 06 Aug 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-25287 , CVE-2021-25288 , CVE-2021-28675 , CVE-2021-28676 , CVE-2021-28677 , CVE-2021-28678 , CVE-2021-34552

Description

Updated python-pillow packages fix security vulnerabilities:

An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds
read in J2kDecode, in j2ku_graya_la (CVE-2021-25287).

An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds
read in J2kDecode, in j2ku_gray_i (CVE-2021-25288).

An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile
lacked a sanity check on the number of input layers relative to the size of
the data block. This could lead to a DoS on Image.open prior to Image.load
(CVE-2021-28675).

An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did
not properly check that the block advance was non-zero, potentially leading
to an infinite loop on load (CVE-2021-28676).

An issue was discovered in Pillow before 8.2.0. For EPS data, the readline
implementation used in EPSImageFile has to deal with any combination of \r
and \n as line endings. It used an accidentally quadratic method of
accumulating lines while looking for a line ending. A malicious EPS file
could use this to perform a DoS of Pillow in the open phase, before an
image was accepted for opening (CVE-2021-28677).

An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin
did not properly check that reads (after jumping to file offsets) returned
data. This could lead to a DoS where the decoder could be run a large number
of times on empty data (CVE-2021-28678).

Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7
allow an attacker to pass controlled parameters directly into a convert
function to trigger a buffer overflow in Convert.c (CVE-2021-34552).
                

References

SRPMS

8/core