Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-0740 (GCVE-0-2016-0740)
Vulnerability from cvelistv5
Published
2016-04-13 16:00
Modified
2024-08-05 22:30
Severity ?
EPSS score ?
Summary
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:30:03.984Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-201612-52", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201612-52", }, { name: "DSA-3499", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3499", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-04T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-06-30T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "GLSA-201612-52", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201612-52", }, { name: "DSA-3499", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3499", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-0740", datePublished: "2016-04-13T16:00:00", dateReserved: "2015-12-16T00:00:00", dateUpdated: "2024-08-05T22:30:03.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.1.0\", \"matchCriteriaId\": \"2F573E4A-55AB-4868-8CA1-7C7E5EEAC905\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de buffer en la funci\\u00f3n ImagengLibTiffDecode en libImageng/TiffDecode.c en Pillow en versiones anteriores a 3.1.1 permite a atacantes remotos sobrescribir memoria a trav\\u00e9s de un archivo TIFF manipulado.\"}]", id: "CVE-2016-0740", lastModified: "2024-11-21T02:42:17.367", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2016-04-13T16:59:01.377", references: "[{\"url\": \"http://www.debian.org/security/2016/dsa-3499\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.gentoo.org/glsa/201612-52\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2016/dsa-3499\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201612-52\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2016-0740\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-04-13T16:59:01.377\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en la función ImagengLibTiffDecode en libImageng/TiffDecode.c en Pillow en versiones anteriores a 3.1.1 permite a atacantes remotos sobrescribir memoria a través de un archivo TIFF manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.0\",\"matchCriteriaId\":\"2F573E4A-55AB-4868-8CA1-7C7E5EEAC905\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2016/dsa-3499\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201612-52\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3499\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201612-52\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
opensuse-su-2024:13827-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python310-Pillow-10.3.0-1.1 on GA media
Notes
Title of the patch
python310-Pillow-10.3.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the python310-Pillow-10.3.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13827
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python310-Pillow-10.3.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python310-Pillow-10.3.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13827", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13827-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-3589 page", url: "https://www.suse.com/security/cve/CVE-2014-3589/", }, { category: "self", summary: "SUSE CVE CVE-2014-3598 page", url: "https://www.suse.com/security/cve/CVE-2014-3598/", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, { category: "self", summary: "SUSE CVE CVE-2016-3076 page", url: "https://www.suse.com/security/cve/CVE-2016-3076/", }, { category: "self", summary: "SUSE CVE CVE-2020-15999 page", url: "https://www.suse.com/security/cve/CVE-2020-15999/", }, { category: "self", summary: "SUSE CVE CVE-2020-35653 page", url: "https://www.suse.com/security/cve/CVE-2020-35653/", }, { category: "self", summary: "SUSE CVE CVE-2020-35654 page", url: "https://www.suse.com/security/cve/CVE-2020-35654/", }, { category: "self", summary: "SUSE CVE CVE-2020-35655 page", url: "https://www.suse.com/security/cve/CVE-2020-35655/", }, { category: "self", summary: "SUSE CVE CVE-2021-23437 page", url: "https://www.suse.com/security/cve/CVE-2021-23437/", }, { category: "self", summary: "SUSE CVE CVE-2021-25289 page", url: "https://www.suse.com/security/cve/CVE-2021-25289/", }, { category: "self", summary: "SUSE CVE CVE-2021-25290 page", url: "https://www.suse.com/security/cve/CVE-2021-25290/", }, { category: "self", summary: "SUSE CVE CVE-2021-25291 page", url: "https://www.suse.com/security/cve/CVE-2021-25291/", }, { category: "self", summary: "SUSE CVE CVE-2021-25292 page", url: "https://www.suse.com/security/cve/CVE-2021-25292/", }, { category: "self", summary: "SUSE CVE CVE-2021-25293 page", url: "https://www.suse.com/security/cve/CVE-2021-25293/", }, { category: "self", summary: "SUSE CVE CVE-2021-27921 page", url: "https://www.suse.com/security/cve/CVE-2021-27921/", }, { category: "self", summary: "SUSE CVE CVE-2021-34552 page", url: "https://www.suse.com/security/cve/CVE-2021-34552/", }, { category: "self", summary: "SUSE CVE CVE-2024-28219 page", url: "https://www.suse.com/security/cve/CVE-2024-28219/", }, ], title: "python310-Pillow-10.3.0-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13827-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python310-Pillow-10.3.0-1.1.aarch64", product: { name: "python310-Pillow-10.3.0-1.1.aarch64", product_id: "python310-Pillow-10.3.0-1.1.aarch64", }, }, { category: "product_version", name: "python310-Pillow-tk-10.3.0-1.1.aarch64", product: { name: "python310-Pillow-tk-10.3.0-1.1.aarch64", product_id: "python310-Pillow-tk-10.3.0-1.1.aarch64", }, }, { category: "product_version", name: "python311-Pillow-10.3.0-1.1.aarch64", product: { name: "python311-Pillow-10.3.0-1.1.aarch64", product_id: "python311-Pillow-10.3.0-1.1.aarch64", }, }, { category: "product_version", name: "python311-Pillow-tk-10.3.0-1.1.aarch64", product: { name: "python311-Pillow-tk-10.3.0-1.1.aarch64", product_id: "python311-Pillow-tk-10.3.0-1.1.aarch64", }, }, { category: "product_version", name: "python312-Pillow-10.3.0-1.1.aarch64", product: { name: "python312-Pillow-10.3.0-1.1.aarch64", product_id: "python312-Pillow-10.3.0-1.1.aarch64", }, }, { category: "product_version", name: "python312-Pillow-tk-10.3.0-1.1.aarch64", product: { name: "python312-Pillow-tk-10.3.0-1.1.aarch64", product_id: "python312-Pillow-tk-10.3.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python310-Pillow-10.3.0-1.1.ppc64le", product: { name: "python310-Pillow-10.3.0-1.1.ppc64le", product_id: "python310-Pillow-10.3.0-1.1.ppc64le", }, }, { category: "product_version", name: "python310-Pillow-tk-10.3.0-1.1.ppc64le", product: { name: "python310-Pillow-tk-10.3.0-1.1.ppc64le", product_id: "python310-Pillow-tk-10.3.0-1.1.ppc64le", }, }, { category: "product_version", name: "python311-Pillow-10.3.0-1.1.ppc64le", product: { name: "python311-Pillow-10.3.0-1.1.ppc64le", product_id: "python311-Pillow-10.3.0-1.1.ppc64le", }, }, { category: "product_version", name: "python311-Pillow-tk-10.3.0-1.1.ppc64le", product: { name: "python311-Pillow-tk-10.3.0-1.1.ppc64le", product_id: "python311-Pillow-tk-10.3.0-1.1.ppc64le", }, }, { category: "product_version", name: "python312-Pillow-10.3.0-1.1.ppc64le", product: { name: "python312-Pillow-10.3.0-1.1.ppc64le", product_id: "python312-Pillow-10.3.0-1.1.ppc64le", }, }, { category: "product_version", name: "python312-Pillow-tk-10.3.0-1.1.ppc64le", product: { name: "python312-Pillow-tk-10.3.0-1.1.ppc64le", product_id: "python312-Pillow-tk-10.3.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python310-Pillow-10.3.0-1.1.s390x", product: { name: "python310-Pillow-10.3.0-1.1.s390x", product_id: "python310-Pillow-10.3.0-1.1.s390x", }, }, { category: "product_version", name: "python310-Pillow-tk-10.3.0-1.1.s390x", product: { name: "python310-Pillow-tk-10.3.0-1.1.s390x", product_id: "python310-Pillow-tk-10.3.0-1.1.s390x", }, }, { category: "product_version", name: "python311-Pillow-10.3.0-1.1.s390x", product: { name: "python311-Pillow-10.3.0-1.1.s390x", product_id: "python311-Pillow-10.3.0-1.1.s390x", }, }, { category: "product_version", name: "python311-Pillow-tk-10.3.0-1.1.s390x", product: { name: "python311-Pillow-tk-10.3.0-1.1.s390x", product_id: "python311-Pillow-tk-10.3.0-1.1.s390x", }, }, { category: "product_version", name: "python312-Pillow-10.3.0-1.1.s390x", product: { name: "python312-Pillow-10.3.0-1.1.s390x", product_id: "python312-Pillow-10.3.0-1.1.s390x", }, }, { category: "product_version", name: "python312-Pillow-tk-10.3.0-1.1.s390x", product: { name: "python312-Pillow-tk-10.3.0-1.1.s390x", product_id: "python312-Pillow-tk-10.3.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python310-Pillow-10.3.0-1.1.x86_64", product: { name: "python310-Pillow-10.3.0-1.1.x86_64", product_id: "python310-Pillow-10.3.0-1.1.x86_64", }, }, { category: "product_version", name: "python310-Pillow-tk-10.3.0-1.1.x86_64", product: { name: "python310-Pillow-tk-10.3.0-1.1.x86_64", product_id: "python310-Pillow-tk-10.3.0-1.1.x86_64", }, }, { category: "product_version", name: "python311-Pillow-10.3.0-1.1.x86_64", product: { name: "python311-Pillow-10.3.0-1.1.x86_64", product_id: "python311-Pillow-10.3.0-1.1.x86_64", }, }, { category: "product_version", name: "python311-Pillow-tk-10.3.0-1.1.x86_64", product: { name: "python311-Pillow-tk-10.3.0-1.1.x86_64", product_id: "python311-Pillow-tk-10.3.0-1.1.x86_64", }, }, { category: "product_version", name: "python312-Pillow-10.3.0-1.1.x86_64", product: { name: "python312-Pillow-10.3.0-1.1.x86_64", product_id: "python312-Pillow-10.3.0-1.1.x86_64", }, }, { category: "product_version", name: "python312-Pillow-tk-10.3.0-1.1.x86_64", product: { name: "python312-Pillow-tk-10.3.0-1.1.x86_64", product_id: "python312-Pillow-tk-10.3.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python310-Pillow-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", }, product_reference: "python310-Pillow-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", }, product_reference: "python310-Pillow-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", }, product_reference: "python310-Pillow-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", }, product_reference: "python310-Pillow-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-tk-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", }, product_reference: "python310-Pillow-tk-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-tk-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", }, product_reference: "python310-Pillow-tk-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-tk-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", }, product_reference: "python310-Pillow-tk-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python310-Pillow-tk-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", }, product_reference: "python310-Pillow-tk-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", }, product_reference: "python311-Pillow-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", }, product_reference: "python311-Pillow-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", }, product_reference: "python311-Pillow-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", }, product_reference: "python311-Pillow-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-tk-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", }, product_reference: "python311-Pillow-tk-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-tk-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", }, product_reference: "python311-Pillow-tk-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-tk-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", }, product_reference: "python311-Pillow-tk-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python311-Pillow-tk-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", }, product_reference: "python311-Pillow-tk-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", }, product_reference: "python312-Pillow-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", }, product_reference: "python312-Pillow-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", }, product_reference: "python312-Pillow-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", }, product_reference: "python312-Pillow-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-tk-10.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", }, product_reference: "python312-Pillow-tk-10.3.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-tk-10.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", }, product_reference: "python312-Pillow-tk-10.3.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-tk-10.3.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", }, product_reference: "python312-Pillow-tk-10.3.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python312-Pillow-tk-10.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", }, product_reference: "python312-Pillow-tk-10.3.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-3589", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3589", }, ], notes: [ { category: "general", text: "PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3589", url: "https://www.suse.com/security/cve/CVE-2014-3589", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3589", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3589", }, { cve: "CVE-2014-3598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3598", }, ], notes: [ { category: "general", text: "The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3598", url: "https://www.suse.com/security/cve/CVE-2014-3598", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3598", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3598", }, { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0775", }, { cve: "CVE-2016-3076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3076", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3076", url: "https://www.suse.com/security/cve/CVE-2016-3076", }, { category: "external", summary: "SUSE Bug 973786 for CVE-2016-3076", url: "https://bugzilla.suse.com/973786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-3076", }, { cve: "CVE-2020-15999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15999", }, ], notes: [ { category: "general", text: "Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15999", url: "https://www.suse.com/security/cve/CVE-2020-15999", }, { category: "external", summary: "SUSE Bug 1177914 for CVE-2020-15999", url: "https://bugzilla.suse.com/1177914", }, { category: "external", summary: "SUSE Bug 1177936 for CVE-2020-15999", url: "https://bugzilla.suse.com/1177936", }, { category: "external", summary: "SUSE Bug 1178824 for CVE-2020-15999", url: "https://bugzilla.suse.com/1178824", }, { category: "external", summary: "SUSE Bug 1178894 for CVE-2020-15999", url: "https://bugzilla.suse.com/1178894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-15999", }, { cve: "CVE-2020-35653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35653", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35653", url: "https://www.suse.com/security/cve/CVE-2020-35653", }, { category: "external", summary: "SUSE Bug 1180834 for CVE-2020-35653", url: "https://bugzilla.suse.com/1180834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35653", }, { cve: "CVE-2020-35654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35654", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35654", url: "https://www.suse.com/security/cve/CVE-2020-35654", }, { category: "external", summary: "SUSE Bug 1180833 for CVE-2020-35654", url: "https://bugzilla.suse.com/1180833", }, { category: "external", summary: "SUSE Bug 1183103 for CVE-2020-35654", url: "https://bugzilla.suse.com/1183103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35654", }, { cve: "CVE-2020-35655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35655", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35655", url: "https://www.suse.com/security/cve/CVE-2020-35655", }, { category: "external", summary: "SUSE Bug 1180832 for CVE-2020-35655", url: "https://bugzilla.suse.com/1180832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35655", }, { cve: "CVE-2021-23437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23437", }, ], notes: [ { category: "general", text: "The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23437", url: "https://www.suse.com/security/cve/CVE-2021-23437", }, { category: "external", summary: "SUSE Bug 1190229 for CVE-2021-23437", url: "https://bugzilla.suse.com/1190229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-23437", }, { cve: "CVE-2021-25289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25289", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25289", url: "https://www.suse.com/security/cve/CVE-2021-25289", }, { category: "external", summary: "SUSE Bug 1183103 for CVE-2021-25289", url: "https://bugzilla.suse.com/1183103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2021-25289", }, { cve: "CVE-2021-25290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25290", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25290", url: "https://www.suse.com/security/cve/CVE-2021-25290", }, { category: "external", summary: "SUSE Bug 1183105 for CVE-2021-25290", url: "https://bugzilla.suse.com/1183105", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25290", }, { cve: "CVE-2021-25291", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25291", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25291", url: "https://www.suse.com/security/cve/CVE-2021-25291", }, { category: "external", summary: "SUSE Bug 1183106 for CVE-2021-25291", url: "https://bugzilla.suse.com/1183106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25291", }, { cve: "CVE-2021-25292", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25292", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25292", url: "https://www.suse.com/security/cve/CVE-2021-25292", }, { category: "external", summary: "SUSE Bug 1183101 for CVE-2021-25292", url: "https://bugzilla.suse.com/1183101", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25292", }, { cve: "CVE-2021-25293", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25293", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25293", url: "https://www.suse.com/security/cve/CVE-2021-25293", }, { category: "external", summary: "SUSE Bug 1183102 for CVE-2021-25293", url: "https://bugzilla.suse.com/1183102", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25293", }, { cve: "CVE-2021-27921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27921", }, ], notes: [ { category: "general", text: "Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27921", url: "https://www.suse.com/security/cve/CVE-2021-27921", }, { category: "external", summary: "SUSE Bug 1183110 for CVE-2021-27921", url: "https://bugzilla.suse.com/1183110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-27921", }, { cve: "CVE-2021-34552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-34552", }, ], notes: [ { category: "general", text: "Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-34552", url: "https://www.suse.com/security/cve/CVE-2021-34552", }, { category: "external", summary: "SUSE Bug 1188574 for CVE-2021-34552", url: "https://bugzilla.suse.com/1188574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-34552", }, { cve: "CVE-2024-28219", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-28219", }, ], notes: [ { category: "general", text: "In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-28219", url: "https://www.suse.com/security/cve/CVE-2024-28219", }, { category: "external", summary: "SUSE Bug 1222262 for CVE-2024-28219", url: "https://bugzilla.suse.com/1222262", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python310-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python311-Pillow-tk-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-10.3.0-1.1.x86_64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.aarch64", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.ppc64le", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.s390x", "openSUSE Tumbleweed:python312-Pillow-tk-10.3.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2024-28219", }, ], }
opensuse-su-2024:10511-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python3-Pillow-3.4.2-1.1 on GA media
Notes
Title of the patch
python3-Pillow-3.4.2-1.1 on GA media
Description of the patch
These are all security issues fixed in the python3-Pillow-3.4.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10511
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python3-Pillow-3.4.2-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python3-Pillow-3.4.2-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10511", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10511-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-3589 page", url: "https://www.suse.com/security/cve/CVE-2014-3589/", }, { category: "self", summary: "SUSE CVE CVE-2014-3598 page", url: "https://www.suse.com/security/cve/CVE-2014-3598/", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, { category: "self", summary: "SUSE CVE CVE-2016-3076 page", url: "https://www.suse.com/security/cve/CVE-2016-3076/", }, ], title: "python3-Pillow-3.4.2-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10511-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python3-Pillow-3.4.2-1.1.aarch64", product: { name: "python3-Pillow-3.4.2-1.1.aarch64", product_id: "python3-Pillow-3.4.2-1.1.aarch64", }, }, { category: "product_version", name: "python3-Pillow-tk-3.4.2-1.1.aarch64", product: { name: "python3-Pillow-tk-3.4.2-1.1.aarch64", product_id: "python3-Pillow-tk-3.4.2-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python3-Pillow-3.4.2-1.1.ppc64le", product: { name: "python3-Pillow-3.4.2-1.1.ppc64le", product_id: "python3-Pillow-3.4.2-1.1.ppc64le", }, }, { category: "product_version", name: "python3-Pillow-tk-3.4.2-1.1.ppc64le", product: { name: "python3-Pillow-tk-3.4.2-1.1.ppc64le", product_id: "python3-Pillow-tk-3.4.2-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python3-Pillow-3.4.2-1.1.s390x", product: { name: "python3-Pillow-3.4.2-1.1.s390x", product_id: "python3-Pillow-3.4.2-1.1.s390x", }, }, { category: "product_version", name: "python3-Pillow-tk-3.4.2-1.1.s390x", product: { name: "python3-Pillow-tk-3.4.2-1.1.s390x", product_id: "python3-Pillow-tk-3.4.2-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python3-Pillow-3.4.2-1.1.x86_64", product: { name: "python3-Pillow-3.4.2-1.1.x86_64", product_id: "python3-Pillow-3.4.2-1.1.x86_64", }, }, { category: "product_version", name: "python3-Pillow-tk-3.4.2-1.1.x86_64", product: { name: "python3-Pillow-tk-3.4.2-1.1.x86_64", product_id: "python3-Pillow-tk-3.4.2-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python3-Pillow-3.4.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", }, product_reference: "python3-Pillow-3.4.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-3.4.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", }, product_reference: "python3-Pillow-3.4.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-3.4.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", }, product_reference: "python3-Pillow-3.4.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-3.4.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", }, product_reference: "python3-Pillow-3.4.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-tk-3.4.2-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", }, product_reference: "python3-Pillow-tk-3.4.2-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-tk-3.4.2-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", }, product_reference: "python3-Pillow-tk-3.4.2-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-tk-3.4.2-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", }, product_reference: "python3-Pillow-tk-3.4.2-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-Pillow-tk-3.4.2-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", }, product_reference: "python3-Pillow-tk-3.4.2-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-3589", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3589", }, ], notes: [ { category: "general", text: "PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3589", url: "https://www.suse.com/security/cve/CVE-2014-3589", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3589", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3589", }, { cve: "CVE-2014-3598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3598", }, ], notes: [ { category: "general", text: "The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3598", url: "https://www.suse.com/security/cve/CVE-2014-3598", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3598", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3598", }, { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0775", }, { cve: "CVE-2016-3076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3076", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3076", url: "https://www.suse.com/security/cve/CVE-2016-3076", }, { category: "external", summary: "SUSE Bug 973786 for CVE-2016-3076", url: "https://bugzilla.suse.com/973786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-3.4.2-1.1.x86_64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.aarch64", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.ppc64le", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.s390x", "openSUSE Tumbleweed:python3-Pillow-tk-3.4.2-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-3076", }, ], }
opensuse-su-2024:10567-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python-Pillow-3.1.1-4.1 on GA media
Notes
Title of the patch
python-Pillow-3.1.1-4.1 on GA media
Description of the patch
These are all security issues fixed in the python-Pillow-3.1.1-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10567
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python-Pillow-3.1.1-4.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python-Pillow-3.1.1-4.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10567", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10567-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-3589 page", url: "https://www.suse.com/security/cve/CVE-2014-3589/", }, { category: "self", summary: "SUSE CVE CVE-2014-3598 page", url: "https://www.suse.com/security/cve/CVE-2014-3598/", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, ], title: "python-Pillow-3.1.1-4.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10567-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-Pillow-3.1.1-4.1.aarch64", product: { name: "python-Pillow-3.1.1-4.1.aarch64", product_id: "python-Pillow-3.1.1-4.1.aarch64", }, }, { category: "product_version", name: "python-Pillow-tk-3.1.1-4.1.aarch64", product: { name: "python-Pillow-tk-3.1.1-4.1.aarch64", product_id: "python-Pillow-tk-3.1.1-4.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python-Pillow-3.1.1-4.1.ppc64le", product: { name: "python-Pillow-3.1.1-4.1.ppc64le", product_id: "python-Pillow-3.1.1-4.1.ppc64le", }, }, { category: "product_version", name: "python-Pillow-tk-3.1.1-4.1.ppc64le", product: { name: "python-Pillow-tk-3.1.1-4.1.ppc64le", product_id: "python-Pillow-tk-3.1.1-4.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python-Pillow-3.1.1-4.1.s390x", product: { name: "python-Pillow-3.1.1-4.1.s390x", product_id: "python-Pillow-3.1.1-4.1.s390x", }, }, { category: "product_version", name: "python-Pillow-tk-3.1.1-4.1.s390x", product: { name: "python-Pillow-tk-3.1.1-4.1.s390x", product_id: "python-Pillow-tk-3.1.1-4.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-Pillow-3.1.1-4.1.x86_64", product: { name: "python-Pillow-3.1.1-4.1.x86_64", product_id: "python-Pillow-3.1.1-4.1.x86_64", }, }, { category: "product_version", name: "python-Pillow-tk-3.1.1-4.1.x86_64", product: { name: "python-Pillow-tk-3.1.1-4.1.x86_64", product_id: "python-Pillow-tk-3.1.1-4.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-Pillow-3.1.1-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", }, product_reference: "python-Pillow-3.1.1-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-3.1.1-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", }, product_reference: "python-Pillow-3.1.1-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-3.1.1-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", }, product_reference: "python-Pillow-3.1.1-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-3.1.1-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", }, product_reference: "python-Pillow-3.1.1-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-tk-3.1.1-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", }, product_reference: "python-Pillow-tk-3.1.1-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-tk-3.1.1-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", }, product_reference: "python-Pillow-tk-3.1.1-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-tk-3.1.1-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", }, product_reference: "python-Pillow-tk-3.1.1-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-tk-3.1.1-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", }, product_reference: "python-Pillow-tk-3.1.1-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-3589", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3589", }, ], notes: [ { category: "general", text: "PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3589", url: "https://www.suse.com/security/cve/CVE-2014-3589", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3589", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3589", }, { cve: "CVE-2014-3598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3598", }, ], notes: [ { category: "general", text: "The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3598", url: "https://www.suse.com/security/cve/CVE-2014-3598", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3598", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3598", }, { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-3.1.1-4.1.x86_64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.aarch64", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.ppc64le", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.s390x", "openSUSE Tumbleweed:python-Pillow-tk-3.1.1-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0775", }, ], }
opensuse-su-2024:11209-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python36-Pillow-8.3.2-1.2 on GA media
Notes
Title of the patch
python36-Pillow-8.3.2-1.2 on GA media
Description of the patch
These are all security issues fixed in the python36-Pillow-8.3.2-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11209
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python36-Pillow-8.3.2-1.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python36-Pillow-8.3.2-1.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11209", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11209-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-3589 page", url: "https://www.suse.com/security/cve/CVE-2014-3589/", }, { category: "self", summary: "SUSE CVE CVE-2014-3598 page", url: "https://www.suse.com/security/cve/CVE-2014-3598/", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, { category: "self", summary: "SUSE CVE CVE-2016-3076 page", url: "https://www.suse.com/security/cve/CVE-2016-3076/", }, { category: "self", summary: "SUSE CVE CVE-2020-15999 page", url: "https://www.suse.com/security/cve/CVE-2020-15999/", }, { category: "self", summary: "SUSE CVE CVE-2020-35653 page", url: "https://www.suse.com/security/cve/CVE-2020-35653/", }, { category: "self", summary: "SUSE CVE CVE-2020-35654 page", url: "https://www.suse.com/security/cve/CVE-2020-35654/", }, { category: "self", summary: "SUSE CVE CVE-2020-35655 page", url: "https://www.suse.com/security/cve/CVE-2020-35655/", }, { category: "self", summary: "SUSE CVE CVE-2021-23437 page", url: "https://www.suse.com/security/cve/CVE-2021-23437/", }, { category: "self", summary: "SUSE CVE CVE-2021-25289 page", url: "https://www.suse.com/security/cve/CVE-2021-25289/", }, { category: "self", summary: "SUSE CVE CVE-2021-25290 page", url: "https://www.suse.com/security/cve/CVE-2021-25290/", }, { category: "self", summary: "SUSE CVE CVE-2021-25291 page", url: "https://www.suse.com/security/cve/CVE-2021-25291/", }, { category: "self", summary: "SUSE CVE CVE-2021-25292 page", url: "https://www.suse.com/security/cve/CVE-2021-25292/", }, { category: "self", summary: "SUSE CVE CVE-2021-25293 page", url: "https://www.suse.com/security/cve/CVE-2021-25293/", }, { category: "self", summary: "SUSE CVE CVE-2021-27921 page", url: "https://www.suse.com/security/cve/CVE-2021-27921/", }, { category: "self", summary: "SUSE CVE CVE-2021-34552 page", url: "https://www.suse.com/security/cve/CVE-2021-34552/", }, ], title: "python36-Pillow-8.3.2-1.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11209-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python36-Pillow-8.3.2-1.2.aarch64", product: { name: "python36-Pillow-8.3.2-1.2.aarch64", product_id: "python36-Pillow-8.3.2-1.2.aarch64", }, }, { category: "product_version", name: "python36-Pillow-tk-8.3.2-1.2.aarch64", product: { name: "python36-Pillow-tk-8.3.2-1.2.aarch64", product_id: "python36-Pillow-tk-8.3.2-1.2.aarch64", }, }, { category: "product_version", name: "python38-Pillow-8.3.2-1.2.aarch64", product: { name: "python38-Pillow-8.3.2-1.2.aarch64", product_id: "python38-Pillow-8.3.2-1.2.aarch64", }, }, { category: "product_version", name: "python38-Pillow-tk-8.3.2-1.2.aarch64", product: { name: "python38-Pillow-tk-8.3.2-1.2.aarch64", product_id: "python38-Pillow-tk-8.3.2-1.2.aarch64", }, }, { category: "product_version", name: "python39-Pillow-8.3.2-1.2.aarch64", product: { name: "python39-Pillow-8.3.2-1.2.aarch64", product_id: "python39-Pillow-8.3.2-1.2.aarch64", }, }, { category: "product_version", name: "python39-Pillow-tk-8.3.2-1.2.aarch64", product: { name: "python39-Pillow-tk-8.3.2-1.2.aarch64", product_id: "python39-Pillow-tk-8.3.2-1.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python36-Pillow-8.3.2-1.2.ppc64le", product: { name: "python36-Pillow-8.3.2-1.2.ppc64le", product_id: "python36-Pillow-8.3.2-1.2.ppc64le", }, }, { category: "product_version", name: "python36-Pillow-tk-8.3.2-1.2.ppc64le", product: { name: "python36-Pillow-tk-8.3.2-1.2.ppc64le", product_id: "python36-Pillow-tk-8.3.2-1.2.ppc64le", }, }, { category: "product_version", name: "python38-Pillow-8.3.2-1.2.ppc64le", product: { name: "python38-Pillow-8.3.2-1.2.ppc64le", product_id: "python38-Pillow-8.3.2-1.2.ppc64le", }, }, { category: "product_version", name: "python38-Pillow-tk-8.3.2-1.2.ppc64le", product: { name: "python38-Pillow-tk-8.3.2-1.2.ppc64le", product_id: "python38-Pillow-tk-8.3.2-1.2.ppc64le", }, }, { category: "product_version", name: "python39-Pillow-8.3.2-1.2.ppc64le", product: { name: "python39-Pillow-8.3.2-1.2.ppc64le", product_id: "python39-Pillow-8.3.2-1.2.ppc64le", }, }, { category: "product_version", name: "python39-Pillow-tk-8.3.2-1.2.ppc64le", product: { name: "python39-Pillow-tk-8.3.2-1.2.ppc64le", product_id: "python39-Pillow-tk-8.3.2-1.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python36-Pillow-8.3.2-1.2.s390x", product: { name: "python36-Pillow-8.3.2-1.2.s390x", product_id: "python36-Pillow-8.3.2-1.2.s390x", }, }, { category: "product_version", name: "python36-Pillow-tk-8.3.2-1.2.s390x", product: { name: "python36-Pillow-tk-8.3.2-1.2.s390x", product_id: "python36-Pillow-tk-8.3.2-1.2.s390x", }, }, { category: "product_version", name: "python38-Pillow-8.3.2-1.2.s390x", product: { name: "python38-Pillow-8.3.2-1.2.s390x", product_id: "python38-Pillow-8.3.2-1.2.s390x", }, }, { category: "product_version", name: "python38-Pillow-tk-8.3.2-1.2.s390x", product: { name: "python38-Pillow-tk-8.3.2-1.2.s390x", product_id: "python38-Pillow-tk-8.3.2-1.2.s390x", }, }, { category: "product_version", name: "python39-Pillow-8.3.2-1.2.s390x", product: { name: "python39-Pillow-8.3.2-1.2.s390x", product_id: "python39-Pillow-8.3.2-1.2.s390x", }, }, { category: "product_version", name: "python39-Pillow-tk-8.3.2-1.2.s390x", product: { name: "python39-Pillow-tk-8.3.2-1.2.s390x", product_id: "python39-Pillow-tk-8.3.2-1.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python36-Pillow-8.3.2-1.2.x86_64", product: { name: "python36-Pillow-8.3.2-1.2.x86_64", product_id: "python36-Pillow-8.3.2-1.2.x86_64", }, }, { category: "product_version", name: "python36-Pillow-tk-8.3.2-1.2.x86_64", product: { name: "python36-Pillow-tk-8.3.2-1.2.x86_64", product_id: "python36-Pillow-tk-8.3.2-1.2.x86_64", }, }, { category: "product_version", name: "python38-Pillow-8.3.2-1.2.x86_64", product: { name: "python38-Pillow-8.3.2-1.2.x86_64", product_id: "python38-Pillow-8.3.2-1.2.x86_64", }, }, { category: "product_version", name: "python38-Pillow-tk-8.3.2-1.2.x86_64", product: { name: "python38-Pillow-tk-8.3.2-1.2.x86_64", product_id: "python38-Pillow-tk-8.3.2-1.2.x86_64", }, }, { category: "product_version", name: "python39-Pillow-8.3.2-1.2.x86_64", product: { name: "python39-Pillow-8.3.2-1.2.x86_64", product_id: "python39-Pillow-8.3.2-1.2.x86_64", }, }, { category: "product_version", name: "python39-Pillow-tk-8.3.2-1.2.x86_64", product: { name: "python39-Pillow-tk-8.3.2-1.2.x86_64", product_id: "python39-Pillow-tk-8.3.2-1.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python36-Pillow-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", }, product_reference: "python36-Pillow-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", }, product_reference: "python36-Pillow-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", }, product_reference: "python36-Pillow-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", }, product_reference: "python36-Pillow-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-tk-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", }, product_reference: "python36-Pillow-tk-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-tk-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", }, product_reference: "python36-Pillow-tk-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-tk-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", }, product_reference: "python36-Pillow-tk-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-Pillow-tk-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", }, product_reference: "python36-Pillow-tk-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", }, product_reference: "python38-Pillow-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", }, product_reference: "python38-Pillow-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", }, product_reference: "python38-Pillow-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", }, product_reference: "python38-Pillow-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-tk-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", }, product_reference: "python38-Pillow-tk-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-tk-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", }, product_reference: "python38-Pillow-tk-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-tk-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", }, product_reference: "python38-Pillow-tk-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-Pillow-tk-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", }, product_reference: "python38-Pillow-tk-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", }, product_reference: "python39-Pillow-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", }, product_reference: "python39-Pillow-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", }, product_reference: "python39-Pillow-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", }, product_reference: "python39-Pillow-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-tk-8.3.2-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", }, product_reference: "python39-Pillow-tk-8.3.2-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-tk-8.3.2-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", }, product_reference: "python39-Pillow-tk-8.3.2-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-tk-8.3.2-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", }, product_reference: "python39-Pillow-tk-8.3.2-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-Pillow-tk-8.3.2-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", }, product_reference: "python39-Pillow-tk-8.3.2-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-3589", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3589", }, ], notes: [ { category: "general", text: "PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3589", url: "https://www.suse.com/security/cve/CVE-2014-3589", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3589", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3589", }, { cve: "CVE-2014-3598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3598", }, ], notes: [ { category: "general", text: "The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3598", url: "https://www.suse.com/security/cve/CVE-2014-3598", }, { category: "external", summary: "SUSE Bug 921566 for CVE-2014-3598", url: "https://bugzilla.suse.com/921566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3598", }, { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0775", }, { cve: "CVE-2016-3076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3076", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3076", url: "https://www.suse.com/security/cve/CVE-2016-3076", }, { category: "external", summary: "SUSE Bug 973786 for CVE-2016-3076", url: "https://bugzilla.suse.com/973786", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-3076", }, { cve: "CVE-2020-15999", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15999", }, ], notes: [ { category: "general", text: "Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15999", url: "https://www.suse.com/security/cve/CVE-2020-15999", }, { category: "external", summary: "SUSE Bug 1177914 for CVE-2020-15999", url: "https://bugzilla.suse.com/1177914", }, { category: "external", summary: "SUSE Bug 1177936 for CVE-2020-15999", url: "https://bugzilla.suse.com/1177936", }, { category: "external", summary: "SUSE Bug 1178824 for CVE-2020-15999", url: "https://bugzilla.suse.com/1178824", }, { category: "external", summary: "SUSE Bug 1178894 for CVE-2020-15999", url: "https://bugzilla.suse.com/1178894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-15999", }, { cve: "CVE-2020-35653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35653", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35653", url: "https://www.suse.com/security/cve/CVE-2020-35653", }, { category: "external", summary: "SUSE Bug 1180834 for CVE-2020-35653", url: "https://bugzilla.suse.com/1180834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35653", }, { cve: "CVE-2020-35654", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35654", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35654", url: "https://www.suse.com/security/cve/CVE-2020-35654", }, { category: "external", summary: "SUSE Bug 1180833 for CVE-2020-35654", url: "https://bugzilla.suse.com/1180833", }, { category: "external", summary: "SUSE Bug 1183103 for CVE-2020-35654", url: "https://bugzilla.suse.com/1183103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35654", }, { cve: "CVE-2020-35655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35655", }, ], notes: [ { category: "general", text: "In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35655", url: "https://www.suse.com/security/cve/CVE-2020-35655", }, { category: "external", summary: "SUSE Bug 1180832 for CVE-2020-35655", url: "https://bugzilla.suse.com/1180832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-35655", }, { cve: "CVE-2021-23437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23437", }, ], notes: [ { category: "general", text: "The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23437", url: "https://www.suse.com/security/cve/CVE-2021-23437", }, { category: "external", summary: "SUSE Bug 1190229 for CVE-2021-23437", url: "https://bugzilla.suse.com/1190229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-23437", }, { cve: "CVE-2021-25289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25289", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25289", url: "https://www.suse.com/security/cve/CVE-2021-25289", }, { category: "external", summary: "SUSE Bug 1183103 for CVE-2021-25289", url: "https://bugzilla.suse.com/1183103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2021-25289", }, { cve: "CVE-2021-25290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25290", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25290", url: "https://www.suse.com/security/cve/CVE-2021-25290", }, { category: "external", summary: "SUSE Bug 1183105 for CVE-2021-25290", url: "https://bugzilla.suse.com/1183105", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25290", }, { cve: "CVE-2021-25291", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25291", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25291", url: "https://www.suse.com/security/cve/CVE-2021-25291", }, { category: "external", summary: "SUSE Bug 1183106 for CVE-2021-25291", url: "https://bugzilla.suse.com/1183106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25291", }, { cve: "CVE-2021-25292", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25292", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25292", url: "https://www.suse.com/security/cve/CVE-2021-25292", }, { category: "external", summary: "SUSE Bug 1183101 for CVE-2021-25292", url: "https://bugzilla.suse.com/1183101", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25292", }, { cve: "CVE-2021-25293", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25293", }, ], notes: [ { category: "general", text: "An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25293", url: "https://www.suse.com/security/cve/CVE-2021-25293", }, { category: "external", summary: "SUSE Bug 1183102 for CVE-2021-25293", url: "https://bugzilla.suse.com/1183102", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25293", }, { cve: "CVE-2021-27921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27921", }, ], notes: [ { category: "general", text: "Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27921", url: "https://www.suse.com/security/cve/CVE-2021-27921", }, { category: "external", summary: "SUSE Bug 1183110 for CVE-2021-27921", url: "https://bugzilla.suse.com/1183110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-27921", }, { cve: "CVE-2021-34552", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-34552", }, ], notes: [ { category: "general", text: "Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-34552", url: "https://www.suse.com/security/cve/CVE-2021-34552", }, { category: "external", summary: "SUSE Bug 1188574 for CVE-2021-34552", url: "https://bugzilla.suse.com/1188574", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python36-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python38-Pillow-tk-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-8.3.2-1.2.x86_64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.aarch64", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.ppc64le", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.s390x", "openSUSE Tumbleweed:python39-Pillow-tk-8.3.2-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-34552", }, ], }
suse-su-2016:0935-1
Vulnerability from csaf_suse
Published
2016-04-01 13:29
Modified
2016-04-01 13:29
Summary
Security update for python-Pillow
Notes
Title of the patch
Security update for python-Pillow
Description of the patch
This update for python-Pillow fixes the following security issues:
* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening
FLI files. (bsc#965582)
* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of
memory to be overwritten when opening a specially crafted invalid TIFF
file. (bsc#965579)
* Fixed an integer overflow in Resample.c causing writes in the Python heap.
* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening
PhotoCD files.
Patchnames
SUSE-OpenStack-Cloud-6-2016-539,SUSE-Storage-2.1-2016-539
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python-Pillow", title: "Title of the patch", }, { category: "description", text: "\nThis update for python-Pillow fixes the following security issues:\n\n* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening \n FLI files. (bsc#965582)\n* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of \n memory to be overwritten when opening a specially crafted invalid TIFF \n file. (bsc#965579)\n* Fixed an integer overflow in Resample.c causing writes in the Python heap. \n* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening \n PhotoCD files.\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-6-2016-539,SUSE-Storage-2.1-2016-539", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0935-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:0935-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20160935-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:0935-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-April/001978.html", }, { category: "self", summary: "SUSE Bug 965579", url: "https://bugzilla.suse.com/965579", }, { category: "self", summary: "SUSE Bug 965582", url: "https://bugzilla.suse.com/965582", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, ], title: "Security update for python-Pillow", tracking: { current_release_date: "2016-04-01T13:29:16Z", generator: { date: "2016-04-01T13:29:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:0935-1", initial_release_date: "2016-04-01T13:29:16Z", revision_history: [ { date: "2016-04-01T13:29:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-Pillow-2.7.0-3.1.x86_64", product: { name: "python-Pillow-2.7.0-3.1.x86_64", product_id: "python-Pillow-2.7.0-3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 6", product: { name: "SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 2.1", product: { name: "SUSE Enterprise Storage 2.1", product_id: "SUSE Enterprise Storage 2.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:2.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-Pillow-2.7.0-3.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", }, product_reference: "python-Pillow-2.7.0-3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "python-Pillow-2.7.0-3.1.x86_64 as component of SUSE Enterprise Storage 2.1", product_id: "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", }, product_reference: "python-Pillow-2.7.0-3.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 2.1", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-04-01T13:29:16Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 2.1:python-Pillow-2.7.0-3.1.x86_64", "SUSE OpenStack Cloud 6:python-Pillow-2.7.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-04-01T13:29:16Z", details: "moderate", }, ], title: "CVE-2016-0775", }, ], }
suse-su-2016:1569-1
Vulnerability from csaf_suse
Published
2016-06-14 09:28
Modified
2016-06-14 09:28
Summary
Security update for python-Pillow
Notes
Title of the patch
Security update for python-Pillow
Description of the patch
This update for python-Pillow fixes the following security issues:
* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening
FLI files. (bsc#965582)
* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of
memory to be overwritten when opening a specially crafted invalid TIFF
file. (bsc#965579)
* Fixed an integer overflow in Resample.c causing writes in the Python heap.
* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening
PhotoCD files.
Patchnames
SUSE-Storage-2-2016-934
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python-Pillow", title: "Title of the patch", }, { category: "description", text: "\nThis update for python-Pillow fixes the following security issues:\n\n* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening\n FLI files. (bsc#965582)\n* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of\n memory to be overwritten when opening a specially crafted invalid TIFF\n file. (bsc#965579)\n* Fixed an integer overflow in Resample.c causing writes in the Python heap.\n* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening\n PhotoCD files.\n", title: "Description of the patch", }, { category: "details", text: "SUSE-Storage-2-2016-934", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1569-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:1569-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20161569-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:1569-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002113.html", }, { category: "self", summary: "SUSE Bug 965579", url: "https://bugzilla.suse.com/965579", }, { category: "self", summary: "SUSE Bug 965582", url: "https://bugzilla.suse.com/965582", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, ], title: "Security update for python-Pillow", tracking: { current_release_date: "2016-06-14T09:28:36Z", generator: { date: "2016-06-14T09:28:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:1569-1", initial_release_date: "2016-06-14T09:28:36Z", revision_history: [ { date: "2016-06-14T09:28:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-Pillow-2.7.0-3.2.x86_64", product: { name: "python-Pillow-2.7.0-3.2.x86_64", product_id: "python-Pillow-2.7.0-3.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Enterprise Storage 2", product: { name: "SUSE Enterprise Storage 2", product_id: "SUSE Enterprise Storage 2", product_identification_helper: { cpe: "cpe:/o:suse:ses:2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-Pillow-2.7.0-3.2.x86_64 as component of SUSE Enterprise Storage 2", product_id: "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", }, product_reference: "python-Pillow-2.7.0-3.2.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 2", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-14T09:28:36Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 2:python-Pillow-2.7.0-3.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-06-14T09:28:36Z", details: "moderate", }, ], title: "CVE-2016-0775", }, ], }
suse-su-2016:0924-1
Vulnerability from csaf_suse
Published
2016-03-31 12:18
Modified
2016-03-31 12:18
Summary
Security update for python-Pillow
Notes
Title of the patch
Security update for python-Pillow
Description of the patch
This update for python-Pillow fixes the following security issues:
* Fixed an integer overflow in Resample.c causing writes in the Python heap.
* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening
PhotoCD files. CVE-2016-TBD
* Fixed a buffer overflow in FliDecode.c causing a segfault when opening
FLI files. CVE-2016-0775 (fixes bsc#965582)
* Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of
memory to be overwritten when opening a specially crafted invalid TIFF
file. CVE-2016-0740 (fixes bsc#965579)
Patchnames
sleclo50sp3-python-Pillow-12485
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python-Pillow", title: "Title of the patch", }, { category: "description", text: "\nThis update for python-Pillow fixes the following security issues:\n\n* Fixed an integer overflow in Resample.c causing writes in the Python heap. \n* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening \n PhotoCD files. CVE-2016-TBD\n* Fixed a buffer overflow in FliDecode.c causing a segfault when opening \n FLI files. CVE-2016-0775 (fixes bsc#965582)\n* Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of \n memory to be overwritten when opening a specially crafted invalid TIFF \n file. CVE-2016-0740 (fixes bsc#965579)\n", title: "Description of the patch", }, { category: "details", text: "sleclo50sp3-python-Pillow-12485", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0924-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:0924-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20160924-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:0924-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-March/001976.html", }, { category: "self", summary: "SUSE Bug 965579", url: "https://bugzilla.suse.com/965579", }, { category: "self", summary: "SUSE Bug 965582", url: "https://bugzilla.suse.com/965582", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, ], title: "Security update for python-Pillow", tracking: { current_release_date: "2016-03-31T12:18:26Z", generator: { date: "2016-03-31T12:18:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:0924-1", initial_release_date: "2016-03-31T12:18:26Z", revision_history: [ { date: "2016-03-31T12:18:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-Pillow-2.7.0-9.1.x86_64", product: { name: "python-Pillow-2.7.0-9.1.x86_64", product_id: "python-Pillow-2.7.0-9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 5", product: { name: "SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5", product_identification_helper: { cpe: "cpe:/o:suse:cloud:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-Pillow-2.7.0-9.1.x86_64 as component of SUSE OpenStack Cloud 5", product_id: "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", }, product_reference: "python-Pillow-2.7.0-9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 5", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-03-31T12:18:26Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE OpenStack Cloud 5:python-Pillow-2.7.0-9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-03-31T12:18:26Z", details: "moderate", }, ], title: "CVE-2016-0775", }, ], }
suse-su-2016:1355-1
Vulnerability from csaf_suse
Published
2016-05-19 08:04
Modified
2016-05-19 08:04
Summary
Security update for python-Pillow
Notes
Title of the patch
Security update for python-Pillow
Description of the patch
This update for python-Pillow fixes the following security issues:
* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening
FLI files. (bsc#965582)
* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of
memory to be overwritten when opening a specially crafted invalid TIFF
file. (bsc#965579)
* Fixed an integer overflow in Resample.c causing writes in the Python heap.
* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening
PhotoCD files.
Patchnames
SUSE-Storage-1.0-2016-796
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python-Pillow", title: "Title of the patch", }, { category: "description", text: "\nThis update for python-Pillow fixes the following security issues:\n\n* CVE-2016-0775: Fixed a buffer overflow in FliDecode.c causing a segfault when opening \n FLI files. (bsc#965582)\n* CVE-2016-0740: Fixed a buffer overflow in TiffDecode.c causing an arbitrary amount of \n memory to be overwritten when opening a specially crafted invalid TIFF \n file. (bsc#965579)\n* Fixed an integer overflow in Resample.c causing writes in the Python heap. \n* Fixed a buffer overflow in PcdDecode.c causing a segfault when opening \n PhotoCD files.\n", title: "Description of the patch", }, { category: "details", text: "SUSE-Storage-1.0-2016-796", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1355-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:1355-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20161355-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:1355-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002073.html", }, { category: "self", summary: "SUSE Bug 965579", url: "https://bugzilla.suse.com/965579", }, { category: "self", summary: "SUSE Bug 965582", url: "https://bugzilla.suse.com/965582", }, { category: "self", summary: "SUSE CVE CVE-2016-0740 page", url: "https://www.suse.com/security/cve/CVE-2016-0740/", }, { category: "self", summary: "SUSE CVE CVE-2016-0775 page", url: "https://www.suse.com/security/cve/CVE-2016-0775/", }, ], title: "Security update for python-Pillow", tracking: { current_release_date: "2016-05-19T08:04:33Z", generator: { date: "2016-05-19T08:04:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:1355-1", initial_release_date: "2016-05-19T08:04:33Z", revision_history: [ { date: "2016-05-19T08:04:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-Pillow-2.7.0-7.1.x86_64", product: { name: "python-Pillow-2.7.0-7.1.x86_64", product_id: "python-Pillow-2.7.0-7.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Enterprise Storage 1.0", product: { name: "SUSE Enterprise Storage 1.0", product_id: "SUSE Enterprise Storage 1.0", product_identification_helper: { cpe: "cpe:/o:suse:ses:1.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-Pillow-2.7.0-7.1.x86_64 as component of SUSE Enterprise Storage 1.0", product_id: "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", }, product_reference: "python-Pillow-2.7.0-7.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 1.0", }, ], }, vulnerabilities: [ { cve: "CVE-2016-0740", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0740", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0740", url: "https://www.suse.com/security/cve/CVE-2016-0740", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0740", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0740", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-05-19T08:04:33Z", details: "moderate", }, ], title: "CVE-2016-0740", }, { cve: "CVE-2016-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0775", }, ], notes: [ { category: "general", text: "Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0775", url: "https://www.suse.com/security/cve/CVE-2016-0775", }, { category: "external", summary: "SUSE Bug 965579 for CVE-2016-0775", url: "https://bugzilla.suse.com/965579", }, { category: "external", summary: "SUSE Bug 965582 for CVE-2016-0775", url: "https://bugzilla.suse.com/965582", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 1.0:python-Pillow-2.7.0-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-05-19T08:04:33Z", details: "moderate", }, ], title: "CVE-2016-0775", }, ], }
ghsa-hggx-3h72-49ww
Vulnerability from github
Published
2018-07-24 20:03
Modified
2024-10-09 19:42
Severity ?
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Summary
Pillow Buffer overflow in ImagingLibTiffDecode
Details
Buffer overflow in the ImagingLibTiffDecode
function in libImaging/TiffDecode.c
in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
{ affected: [ { package: { ecosystem: "PyPI", name: "pillow", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "3.1.1", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2016-0740", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: true, github_reviewed_at: "2020-06-16T21:40:09Z", nvd_published_at: null, severity: "MODERATE", }, details: "Buffer overflow in the `ImagingLibTiffDecode` function in `libImaging/TiffDecode.c` in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", id: "GHSA-hggx-3h72-49ww", modified: "2024-10-09T19:42:52Z", published: "2018-07-24T20:03:51Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-0740", }, { type: "WEB", url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { type: "ADVISORY", url: "https://github.com/advisories/GHSA-hggx-3h72-49ww", }, { type: "WEB", url: "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-5.yaml", }, { type: "PACKAGE", url: "https://github.com/python-pillow/Pillow", }, { type: "WEB", url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201612-52", }, { type: "WEB", url: "http://www.debian.org/security/2016/dsa-3499", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", type: "CVSS_V3", }, { score: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", type: "CVSS_V4", }, ], summary: "Pillow Buffer overflow in ImagingLibTiffDecode", }
pysec-2016-5
Vulnerability from pysec
Published
2016-04-13 16:59
Modified
2021-07-05 00:01
Details
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
Impacted products
Name | purl |
---|---|
pillow | pkg:pypi/pillow |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "pillow", purl: "pkg:pypi/pillow", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "6dcbf5bd96b717c58d7b642949da8d323099928e", }, ], repo: "https://github.com/python-pillow/Pillow", type: "GIT", }, { events: [ { introduced: "0", }, { fixed: "3.1.1", }, ], type: "ECOSYSTEM", }, ], versions: [ "1.0", "1.1", "1.2", "1.3", "1.4", "1.5", "1.6", "1.7.0", "1.7.1", "1.7.2", "1.7.3", "1.7.4", "1.7.5", "1.7.6", "1.7.7", "1.7.8", "2.0.0", "2.1.0", "2.2.0", "2.2.1", "2.2.2", "2.3.0", "2.3.1", "2.3.2", "2.4.0", "2.5.0", "2.5.1", "2.5.2", "2.5.3", "2.6.0", "2.6.1", "2.6.2", "2.7.0", "2.8.0", "2.8.1", "2.8.2", "2.9.0", "3.0.0", "3.1.0", "3.1.0.rc1", "3.1.0rc1", ], }, ], aliases: [ "CVE-2016-0740", "GHSA-hggx-3h72-49ww", ], details: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", id: "PYSEC-2016-5", modified: "2021-07-05T00:01:23.915090Z", published: "2016-04-13T16:59:00Z", references: [ { type: "ADVISORY", url: "http://www.debian.org/security/2016/dsa-3499", }, { type: "FIX", url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { type: "WEB", url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { type: "ADVISORY", url: "https://security.gentoo.org/glsa/201612-52", }, { type: "ADVISORY", url: "https://github.com/advisories/GHSA-hggx-3h72-49ww", }, ], }
gsd-2016-0740
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-0740", description: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", id: "GSD-2016-0740", references: [ "https://www.suse.com/security/cve/CVE-2016-0740.html", "https://www.debian.org/security/2016/dsa-3499", "https://ubuntu.com/security/CVE-2016-0740", "https://advisories.mageia.org/CVE-2016-0740.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-0740", ], details: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", id: "GSD-2016-0740", modified: "2023-12-13T01:21:17.383750Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-0740", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_affected: "=", version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.debian.org/security/2016/dsa-3499", refsource: "MISC", url: "http://www.debian.org/security/2016/dsa-3499", }, { name: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", refsource: "MISC", url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { name: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", refsource: "MISC", url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { name: "https://security.gentoo.org/glsa/201612-52", refsource: "MISC", url: "https://security.gentoo.org/glsa/201612-52", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: "<3.1.1", affected_versions: "All versions before 3.1.1", cvss_v2: "AV:N/AC:M/Au:N/C:N/I:P/A:N", cvss_v3: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", cwe_ids: [ "CWE-1035", "CWE-119", "CWE-937", ], date: "2017-06-30", description: "Buffer overflow in the `ImagingLibTiffDecode` function in `libImaging/TiffDecode.c` allows remote attackers to overwrite memory via a crafted TIFF file.", fixed_versions: [ "3.1.1", ], identifier: "CVE-2016-0740", identifiers: [ "CVE-2016-0740", ], not_impacted: "All versions starting from 3.1.1", package_slug: "pypi/Pillow", pubdate: "2016-04-13", solution: "Upgrade to version 3.1.1 or above.", title: "Buffer overflow in ImagingLibTiffDecode", urls: [ "http://www.cvedetails.com/cve/CVE-2016-0740/", "https://github.com/python-pillow/Pillow/blob/3.1.x/CHANGES.rst#311-2016-02-04", "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", ], uuid: "eec9f13f-2151-4ea9-b456-4de0c99aa583", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "3.1.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-0740", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3499", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2016/dsa-3499", }, { name: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", refsource: "CONFIRM", tags: [], url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { name: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", refsource: "CONFIRM", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { name: "GLSA-201612-52", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201612-52", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, }, }, lastModifiedDate: "2017-07-01T01:29Z", publishedDate: "2016-04-13T16:59Z", }, }, }
fkie_cve-2016-0740
Vulnerability from fkie_nvd
Published
2016-04-13 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
python | pillow | * | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*", matchCriteriaId: "2F573E4A-55AB-4868-8CA1-7C7E5EEAC905", versionEndIncluding: "3.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.", }, { lang: "es", value: "Desbordamiento de buffer en la función ImagengLibTiffDecode en libImageng/TiffDecode.c en Pillow en versiones anteriores a 3.1.1 permite a atacantes remotos sobrescribir memoria a través de un archivo TIFF manipulado.", }, ], id: "CVE-2016-0740", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-04-13T16:59:01.377", references: [ { source: "secalert@redhat.com", url: "http://www.debian.org/security/2016/dsa-3499", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { source: "secalert@redhat.com", url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { source: "secalert@redhat.com", url: "https://security.gentoo.org/glsa/201612-52", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3499", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201612-52", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.