Bug#948224: pillow: CVE-2020-5310 CVE-2020-5311 CVE-2020-5312 CVE-2020-5313

2020-02-13 Thread Robert Scott
FWIW I'm fairly convinced that the first vulnerable version for CVE-2020-5310 
is 6.0.0, which is the first release that included 
https://github.com/python-pillow/Pillow/commit/e91b851fdc1c914419543f485bdbaa010790719f
 which introduced 
the overflow when switching away from the safer TIFFTileSize & TIFFStripSize 
in the critical lines.

So you can probably mark 5.4.1 as safe for CVE-2020-5310


robert.



Bug#948224: pillow: CVE-2020-5310 CVE-2020-5311 CVE-2020-5312 CVE-2020-5313

2020-01-05 Thread Salvatore Bonaccorso
Control: found -1 6.2.1-2
Control: retitle pillow: CVE-2019-19911 CVE-2020-5310 CVE-2020-5311 
CVE-2020-5312 CVE-2020-5313

Hi,

On Sun, Jan 05, 2020 at 04:30:36PM +0100, Markus Koschany wrote:
> The following vulnerabilities were published for pillow. It appears they
> are fixed in version 6.2.2.

Additionally there is CVE-2019-19911, fixed by
https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d
as well adressed in 6.2.2. Thus track it here with same bug.

Regards,
Salvatore



Bug#948224: pillow: CVE-2020-5310 CVE-2020-5311 CVE-2020-5312 CVE-2020-5313

2020-01-05 Thread Markus Koschany
Package: pillow
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for pillow. It appears they
are fixed in version 6.2.2.

CVE-2020-5310[0]:
| libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding
| integer overflow, related to realloc.


CVE-2020-5311[1]:
| libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer
| overflow.


CVE-2020-5312[2]:
| libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer
| overflow.


CVE-2020-5313[3]:
| libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer
| overflow.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-5310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310
[1] https://security-tracker.debian.org/tracker/CVE-2020-5311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5311
[2] https://security-tracker.debian.org/tracker/CVE-2020-5312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312
[3] https://security-tracker.debian.org/tracker/CVE-2020-5313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313

Please adjust the affected versions in the BTS as needed.

Regards,

Markus



signature.asc
Description: OpenPGP digital signature