Bug 1185784 (CVE-2021-28678) - VUL-0: CVE-2021-28678: python-Pillow: improper check in BlpImagePlugin can lead to DoS
Summary: VUL-0: CVE-2021-28678: python-Pillow: improper check in BlpImagePlugin can le...
Status: RESOLVED FIXED
Alias: CVE-2021-28678
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/283765/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-28678:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-05-07 15:24 UTC by Gianluca Gabrielli
Modified: 2024-05-14 12:00 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-05-07 15:24:12 UTC
CVE-2021-28678

BlpImagePlugin did not properly check that reads after jumping to file offsets returned data. This could lead to a denial-of-service where the decoder could be run a large number of times on empty data. This dates to Pillow 5.1.0.

References:
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#security
https://github.com/python-pillow/Pillow/pull/5377

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1958263
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28678
Comment 1 Gianluca Gabrielli 2021-05-07 15:24:35 UTC
closing since no package is affected
Comment 2 Gianluca Gabrielli 2021-05-12 14:16:59 UTC
Re-open because the following packages are actually affected:

- SUSE:SLE-12-SP4:Update:Products:Cloud9:Update/python-Pillow   5.2.0

Upstream patch [0].

[0] https://github.com/python-pillow/Pillow/commit/496245aa4365d0827390bd0b6fbd11287453b3a1.patch
Comment 4 Swamp Workflow Management 2021-06-10 13:23:16 UTC
SUSE-SU-2021:1938-1: An update that fixes 14 vulnerabilities is now available.

Category: security (important)
Bug References: 1180832,1180834,1183101,1183102,1183105,1183107,1183108,1183110,1185784,1185785,1185786,1185803,1185804,1185805
CVE References: CVE-2020-35653,CVE-2020-35655,CVE-2021-25287,CVE-2021-25288,CVE-2021-25290,CVE-2021-25292,CVE-2021-25293,CVE-2021-27921,CVE-2021-27922,CVE-2021-27923,CVE-2021-28675,CVE-2021-28676,CVE-2021-28677,CVE-2021-28678
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    python-Pillow-5.2.0-3.8.1
SUSE OpenStack Cloud 9 (src):    python-Pillow-5.2.0-3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Christian Almeida de Oliveira 2021-06-22 13:31:50 UTC
fix for affected SOC version released, back to security team.
Comment 6 Marcus Meissner 2021-09-13 10:30:52 UTC
released
Comment 8 Maintenance Automation 2024-05-10 20:30:15 UTC
SUSE-SU-2024:1607-1: An update that solves six vulnerabilities can now be installed.

Category: security (important)
Bug References: 1185784, 1185785, 1185786, 1185803, 1185804, 1185805
CVE References: CVE-2021-25287, CVE-2021-25288, CVE-2021-28675, CVE-2021-28676, CVE-2021-28677, CVE-2021-28678
Maintenance Incident: [SUSE:Maintenance:33801](https://smelt.suse.de/incident/33801/)
Sources used:
openSUSE Leap 15.3 (src):
 python-Pillow-7.2.0-150300.3.12.1
openSUSE Leap 15.5 (src):
 python-Pillow-7.2.0-150300.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.