<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-Pillow</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:2057-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-07-27T20:26:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-07-27T20:26:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-07-27T20:26:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-Pillow</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-Pillow fixes the following issues:

- Add 0019-FLI-overflow-error-fix-and-testcase.patch
   * Fixes CVE-2016-0775, bsc#965582
- Add 0020-Fix-OOB-reads-in-FLI-decoding.patch
   * Fixes CVE-2020-10177, bsc#1173413
- Add 0021-Fix-bounds-overflow-in-JPEG-2000-decoding.patch
   * Fixes CVE-2020-10994, bsc#1173418
- Add 0022-Fix-bounds-overflow-in-PCX-decoding.patch
   * Fixes CVE-2020-10378, bsc#1173416
- Add 0008-Corrected-negative-seeks.patch
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 0009-Make-Image.crop-an-immediate-operation.patch
   * Fixes https://github.com/python-pillow/Pillow/issues/1077
   * Used by 0012-Added-decompression-bomb-checks.patch
- Add 0010-Crop-decompression.patch
   * Used by 0012-Added-decompression-bomb-checks.patch
- Add 0011-Added-DecompressionBombError.patch
   * Used by 0012-Added-decompression-bomb-checks.patch
- Add 0012-Added-decompression-bomb-checks.patch
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 0013-Raise-error-if-dimension-is-a-string.patch
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 0014-Catch-buffer-overruns.patch
   * Fixes part of CVE-2019-16865, bsc#1153191
- Add 0015-Catch-PCX-P-mode-buffer-overrun.patch
   * Fixes CVE-2020-5312, bsc#1160152
- Add 0016-Ensure-previous-FLI-frame-is-loaded.patch
   * Fixes https://github.com/python-pillow/Pillow/issues/2649
   * Uncovers CVE-2020-5313, bsc#1160153
- Add 0017-Catch-FLI-buffer-overrun.patch
   * Fixes CVE-2020-5313, bsc#1160153
- Add 018-Invalid-number-of-bands-in-FPX-image.patch
   * Fixes CVE-2019-19911, bsc#1160192
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-2057,SUSE-Storage-5-2020-2057</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      <Description>Link for SUSE-SU-2020:2057-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:2057-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153191</URL>
      <Description>SUSE Bug 1153191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160152</URL>
      <Description>SUSE Bug 1160152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160153</URL>
      <Description>SUSE Bug 1160153</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160192</URL>
      <Description>SUSE Bug 1160192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173413</URL>
      <Description>SUSE Bug 1173413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173416</URL>
      <Description>SUSE Bug 1173416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173418</URL>
      <Description>SUSE Bug 1173418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/965582</URL>
      <Description>SUSE Bug 965582</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0775/</URL>
      <Description>SUSE CVE CVE-2016-0775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16865/</URL>
      <Description>SUSE CVE CVE-2019-16865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19911/</URL>
      <Description>SUSE CVE CVE-2019-19911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10177/</URL>
      <Description>SUSE CVE CVE-2020-10177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10378/</URL>
      <Description>SUSE CVE CVE-2020-10378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10994/</URL>
      <Description>SUSE CVE CVE-2020-10994 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-5312/</URL>
      <Description>SUSE CVE CVE-2020-5312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-5313/</URL>
      <Description>SUSE CVE CVE-2020-5313 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 5">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 5">
        <FullProductName ProductID="SUSE Enterprise Storage 5" CPE="cpe:/o:suse:ses:5">SUSE Enterprise Storage 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python-Pillow-2.8.1-3.9.1">
      <FullProductName ProductID="python-Pillow-2.8.1-3.9.1">python-Pillow-2.8.1-3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-Pillow-tk-2.8.1-3.9.1">
      <FullProductName ProductID="python-Pillow-tk-2.8.1-3.9.1">python-Pillow-tk-2.8.1-3.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python-Pillow-2.8.1-3.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 5">
      <FullProductName ProductID="SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1">python-Pillow-2.8.1-3.9.1 as a component of SUSE Enterprise Storage 5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.</Note>
    </Notes>
    <CVE>CVE-2016-0775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0775.html</URL>
        <Description>CVE-2016-0775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965579</URL>
        <Description>SUSE Bug 965579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965582</URL>
        <Description>SUSE Bug 965582</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.</Note>
    </Notes>
    <CVE>CVE-2019-16865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16865.html</URL>
        <Description>CVE-2019-16865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153191</URL>
        <Description>SUSE Bug 1153191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.</Note>
    </Notes>
    <CVE>CVE-2019-19911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19911.html</URL>
        <Description>CVE-2019-19911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160192</URL>
        <Description>SUSE Bug 1160192</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c.</Note>
    </Notes>
    <CVE>CVE-2020-10177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10177.html</URL>
        <Description>CVE-2020-10177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173413</URL>
        <Description>SUSE Bug 1173413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state-&gt;shuffle is instructed to read beyond state-&gt;buffer.</Note>
    </Notes>
    <CVE>CVE-2020-10378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10378.html</URL>
        <Description>CVE-2020-10378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161670</URL>
        <Description>SUSE Bug 1161670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173416</URL>
        <Description>SUSE Bug 1173416</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.</Note>
    </Notes>
    <CVE>CVE-2020-10994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10994.html</URL>
        <Description>CVE-2020-10994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173418</URL>
        <Description>SUSE Bug 1173418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2020-5312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-5312.html</URL>
        <Description>CVE-2020-5312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160152</URL>
        <Description>SUSE Bug 1160152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2020-5313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 5:python-Pillow-2.8.1-3.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202057-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-5313.html</URL>
        <Description>CVE-2020-5313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160153</URL>
        <Description>SUSE Bug 1160153</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
