ALT-BU-2023-8122-1
Branch p10_e2k update bulletin.
Package python3-module-Pillow updated to version 9.4.0-alt2 for branch p10_e2k.
Closed vulnerabilities
BDU:2021-05225
Уязвимость компонента Convert.c библиотеки для работы с изображениями Pillow, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05238
Уязвимость компонента FliDecode библиотеки для работы с изображениями Pillow, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05313
Уязвимость реализации readline компонента EPSImageFile библиотеки для работы с изображениями Pillow, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05405
Уязвимость реализации функции convert() или ImagingConvertTransparent() библиотек для работы с изображениями Pillow и PIL (Python Imaging Library, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00581
Уязвимость функции path_getbbox (path.c) библиотеки изображений Python Pillow, связанная с неверным ограничением пути к каталогу, позволяющая нарушителю получить доступ к произвольным файлам в системе
BDU:2022-00582
Уязвимость функции path_getbbox (path.c) библиотеки изображений Python Pillow, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2022-00583
Уязвимость компонента PIL.ImageMath.eval библиотеки изображений Python Pillow, связанная с использованием опасных методов или функций, позволяющая нарушителю выполнить произвольный код
BDU:2022-02242
Уязвимость функции getrgb библиотеки для работы с растровой графикой Pillow, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01714
Уязвимость библиотеки для работы с растровой графикой Pillow, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2023-02447
Уязвимость библиотеки для работы с изображениями Pillow, связанная с ошибкой управления ресурсами, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»
BDU:2023-02448
Уязвимость библиотеки для работы с изображениями Pillow, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»
Modified: 2024-11-21
CVE-2021-23437
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
- https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
- https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- FEDORA-2021-cbfaefb390
- FEDORA-2021-cbfaefb390
- FEDORA-2021-9f020cf155
- FEDORA-2021-9f020cf155
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
- GLSA-202211-10
- GLSA-202211-10
- https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
- https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
Modified: 2024-11-21
CVE-2021-25287
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
- https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
- https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
- FEDORA-2021-77756994ba
- FEDORA-2021-77756994ba
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
- GLSA-202107-33
- GLSA-202107-33
Modified: 2024-11-21
CVE-2021-25288
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.
- https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
- https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470
- FEDORA-2021-77756994ba
- FEDORA-2021-77756994ba
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
- GLSA-202107-33
- GLSA-202107-33
Modified: 2024-11-21
CVE-2021-28675
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
Modified: 2024-11-21
CVE-2021-28676
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
- https://github.com/python-pillow/Pillow/commit/bb6c11fb889e6c11b0ee122b828132ee763b5856
- https://github.com/python-pillow/Pillow/commit/bb6c11fb889e6c11b0ee122b828132ee763b5856
- https://github.com/python-pillow/Pillow/pull/5377
- https://github.com/python-pillow/Pillow/pull/5377
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- FEDORA-2021-77756994ba
- FEDORA-2021-77756994ba
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos
- GLSA-202107-33
- GLSA-202107-33
Modified: 2024-11-21
CVE-2021-28677
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
- https://github.com/python-pillow/Pillow/pull/5377
- https://github.com/python-pillow/Pillow/pull/5377
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- FEDORA-2021-77756994ba
- FEDORA-2021-77756994ba
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open
- GLSA-202107-33
- GLSA-202107-33
Modified: 2024-11-21
CVE-2021-28678
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
- https://github.com/python-pillow/Pillow/pull/5377
- https://github.com/python-pillow/Pillow/pull/5377
- FEDORA-2021-77756994ba
- FEDORA-2021-77756994ba
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos
- https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos
- GLSA-202107-33
- GLSA-202107-33
Modified: 2024-11-21
CVE-2021-34552
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- FEDORA-2021-bf01a738f3
- FEDORA-2021-bf01a738f3
- FEDORA-2021-3ec845dc0c
- FEDORA-2021-3ec845dc0c
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
- https://pillow.readthedocs.io/en/stable/releasenotes/index.html
- https://pillow.readthedocs.io/en/stable/releasenotes/index.html
- GLSA-202211-10
- GLSA-202211-10
Modified: 2024-11-21
CVE-2022-22815
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-22816
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-22817
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-24303
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
- https://github.com/python-pillow/Pillow/pull/3450
- https://github.com/python-pillow/Pillow/pull/3450
- FEDORA-2022-ee15b98ea1
- FEDORA-2022-ee15b98ea1
- FEDORA-2022-64332f2a7c
- FEDORA-2022-64332f2a7c
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- GLSA-202211-10
- GLSA-202211-10
Modified: 2024-11-21
CVE-2022-45198
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).
- https://bugs.gentoo.org/855683
- https://bugs.gentoo.org/855683
- https://cwe.mitre.org/data/definitions/409.html
- https://cwe.mitre.org/data/definitions/409.html
- https://github.com/python-pillow/Pillow/commit/11918eac0628ec8ac0812670d9838361ead2d6a4
- https://github.com/python-pillow/Pillow/commit/11918eac0628ec8ac0812670d9838361ead2d6a4
- https://github.com/python-pillow/Pillow/pull/6402
- https://github.com/python-pillow/Pillow/pull/6402
- https://github.com/python-pillow/Pillow/releases/tag/9.2.0
- https://github.com/python-pillow/Pillow/releases/tag/9.2.0
- GLSA-202211-10
- GLSA-202211-10
Modified: 2024-11-21
CVE-2022-45199
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.
- https://bugs.gentoo.org/878769
- https://bugs.gentoo.org/878769
- https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
- https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
- https://github.com/python-pillow/Pillow/pull/6700
- https://github.com/python-pillow/Pillow/pull/6700
- https://github.com/python-pillow/Pillow/releases/tag/9.3.0
- https://github.com/python-pillow/Pillow/releases/tag/9.3.0
- GLSA-202211-10
- GLSA-202211-10
Package libxfce4util updated to version 4.18.1-alt2 for branch p10_e2k.
Closed bugs
Патч для libxfce4util чтобы выводить русские надписи, если марийских еще нет и для других российских языков тоже.
Closed bugs
При использовании утилиты, уведомление: Use of uninitialized value $platform in hash element at /usr/bin/inxi line 16284
Closed vulnerabilities
Modified: 2025-02-13
CVE-2023-46218
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
- https://curl.se/docs/CVE-2023-46218.html
- https://curl.se/docs/CVE-2023-46218.html
- https://hackerone.com/reports/2212193
- https://hackerone.com/reports/2212193
- https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
- https://security.netapp.com/advisory/ntap-20240125-0007/
- https://security.netapp.com/advisory/ntap-20240125-0007/
- https://www.debian.org/security/2023/dsa-5587
- https://www.debian.org/security/2023/dsa-5587
Modified: 2025-02-13
CVE-2023-46219
When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
- https://curl.se/docs/CVE-2023-46219.html
- https://curl.se/docs/CVE-2023-46219.html
- https://hackerone.com/reports/2236133
- https://hackerone.com/reports/2236133
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
- https://security.netapp.com/advisory/ntap-20240119-0007/
- https://security.netapp.com/advisory/ntap-20240119-0007/
- https://www.debian.org/security/2023/dsa-5587
- https://www.debian.org/security/2023/dsa-5587