drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Pillow (Aktualisierung)
Name: |
Zwei Probleme in Pillow (Aktualisierung) |
|
ID: |
USN-4697-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 ESM |
|
Datum: |
Mi, 20. Januar 2021, 18:24 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10177 |
|
Applikationen: |
Pillow |
|
Update von: |
Mehrere Probleme in Pillow |
|
Originalnachricht |
--===============4745657955214031923== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="pWyiEgJYm5f9v55/" Content-Disposition: inline
--pWyiEgJYm5f9v55/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4697-2 January 20, 2021
pillow vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
Summary:
Pillow could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - pillow: Python Imaging Library
Details:
USN-4697-1 fixed several vulnerabilities in Pillow. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Pillow incorrectly handled certain PCX image files. If a user or automated system were tricked into opening a specially-crafted PCX file, a remote attacker could possibly cause Pillow to crash, resulting in a denial of service. (CVE-2020-35653)
It was discovered that Pillow incorrectly handled certain image files. If a user or automated system were tricked into opening a specially-crafted image file, a remote attacker could possibly cause Pillow to crash, resulting in a denial of service. (CVE-2020-10177)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 ESM: python-pil 2.3.0-1ubuntu3.4+esm2 python3-pil 2.3.0-1ubuntu3.4+esm2
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4697-2 https://usn.ubuntu.com/4697-1 CVE-2020-10177, CVE-2020-35653
--pWyiEgJYm5f9v55/ Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAmAIOQkACgkQRbznW4QL H2n+ww//R+/iHBCqsq7D+UVE7tOcVg5nwbZAf+YdCi0h5AjtsslDmhkm64m6zv4I TMbr55y0syQncYrWmjyc0lKbV0HgzJSlxfMFqqUpH/FpQRgcIFmitGUHn03xnvDX NMr0gjY88E53B1o3Zx3jpbr4s1ffdlTmLdnOVtcJGAAEStoEYWXOsqDUm/shEMZg CakJp/4SNVGAxevHVFmH6eAzUm4awUwqW6tBNSJhqB8Hpom4hj8NoycFFZ2q67xj pPgvOGB5UZ2Cm7p/9/gLm/4VrBRctzJl+1qXO+KIk/hFZOs6GeuM8g+WQrW8UMY4 0IXrfhLgj1djYuS4BbdbJEXIyGEn7mNXBGwbrF2hAgJ2kBB+5yYn+A8brxNVKxis zKfICnawPhWc0A0t46BFtzE2InLvuOr3d+LrnSsARRaiUwGaa47fRa2FDjl+OKSf izwYDuZ7m3D6eSjWdFU3H8u960T9Lw+sM3HYrbhtrof+kti0Qn4XyLuDJGzTqNH+ iM6SOlZ/UU9bVlep3kRc3frnCx5DmFQeZXgSI9ouPeaKdbHYZVPcpwHn+kQpFziY rQIHjpLakGzSSAK0eO3JyZfjhXZp1yNzIhsy6lILev+nQ0tSrCNRPFuwak/Nqzqg CBsDDK72mw093bAbQX/+yJpQxJVUASxN1++43SkiCEa4VlVDJCo= =QMTG -----END PGP SIGNATURE-----
--pWyiEgJYm5f9v55/--
--===============4745657955214031923== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|