Bugzilla – Bug 967970
VUL-0: CVE-2016-2533: python-Pillow: Buffer overflow in PCD decoding
Last modified: 2020-06-30 07:37:38 UTC
http://www.openwall.com/lists/oss-security/2016/02/02/5 There is a buffer overflow in PcdDecode.c, where the decoder writes assuming 4 bytes per pixel into a 3 byte per pixel wide buffer, allowing writing 768 bytes off the end of the buffer. This overwrites objects in Python's stack, leading to a crash. All versions of Python Pillow <= 3.1.0 and PIL == 1.1.7 (at the least) are affected. This issue and the patch are public: https://github.com/python-pillow/Pillow/pull/1706 References: https://bugzilla.redhat.com/show_bug.cgi?id=1304504 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2533 http://seclists.org/oss-sec/2016/q1/396 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2533.html
bugbot adjusting priority
submitted as update for Cloud7, newer than Cloud7 not affected: $ iosc sr SUSE:SLE-12-SP2:Update:Products:Cloud7:Update WARNING: WARNING: Project does not accept submit request, a NEW maintenance incident request will be created instead WARNING: created request id 198363
SUSE-SU-2019:2334-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 967970,975500 CVE References: CVE-2016-2533,CVE-2016-4009 Sources used: SUSE OpenStack Cloud 7 (src): python-Pillow-2.8.1-4.9.1 SUSE Enterprise Storage 4 (src): python-Pillow-2.8.1-4.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:1194-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 967970,975500 CVE References: CVE-2016-2533,CVE-2016-4009 Sources used: SUSE Enterprise Storage 5 (src): python-Pillow-2.8.1-3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SES5 update released per comment 12, assigning back to security-team
Done