Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Pillow (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Pillow (Aktualisierung)
ID: USN-4697-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 ESM
Datum: Mi, 20. Januar 2021, 18:24
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10177
Applikationen: Pillow
Update von: Mehrere Probleme in Pillow

Originalnachricht


--===============4745657955214031923==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="pWyiEgJYm5f9v55/"
Content-Disposition: inline


--pWyiEgJYm5f9v55/
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4697-2
January 20, 2021

pillow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Pillow could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- pillow: Python Imaging Library

Details:

USN-4697-1 fixed several vulnerabilities in Pillow. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Pillow incorrectly handled certain PCX image files.
If a user or automated system were tricked into opening a specially-crafted
PCX file, a remote attacker could possibly cause Pillow to crash,
resulting in a denial of service. (CVE-2020-35653)

It was discovered that Pillow incorrectly handled certain image files. If
a user or automated system were tricked into opening a specially-crafted
image file, a remote attacker could possibly cause Pillow to crash,
resulting in a denial of service. (CVE-2020-10177)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
python-pil 2.3.0-1ubuntu3.4+esm2
python3-pil 2.3.0-1ubuntu3.4+esm2

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4697-2
https://usn.ubuntu.com/4697-1
CVE-2020-10177, CVE-2020-35653

--pWyiEgJYm5f9v55/
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=QMTG
-----END PGP SIGNATURE-----

--pWyiEgJYm5f9v55/--


--===============4745657955214031923==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung