<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-Pillow</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1607-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-05-10T16:35:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-05-10T16:35:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-05-10T16:35:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-Pillow</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-Pillow fixes the following issues:

- CVE-2021-25287: out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805)
- CVE-2021-25288: out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803)
- CVE-2021-28675: DoS in PsdImagePlugin (bsc#1185804)
- CVE-2021-28676: infinite loop in FliDecode.c can lead to DoS (bsc#1185786)
- CVE-2021-28677: DoS in the open phase via a malicious EPS file (bsc#1185785)
- CVE-2021-28678: improper check in BlpImagePlugin can lead to DoS (bsc#1185784)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-1607,openSUSE-SLE-15.5-2024-1607</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      <Description>Link for SUSE-SU-2024:1607-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-May/035237.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1607-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185784</URL>
      <Description>SUSE Bug 1185784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185785</URL>
      <Description>SUSE Bug 1185785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185786</URL>
      <Description>SUSE Bug 1185786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185803</URL>
      <Description>SUSE Bug 1185803</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185804</URL>
      <Description>SUSE Bug 1185804</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185805</URL>
      <Description>SUSE Bug 1185805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-25287/</URL>
      <Description>SUSE CVE CVE-2021-25287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-25288/</URL>
      <Description>SUSE CVE CVE-2021-25288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28675/</URL>
      <Description>SUSE CVE CVE-2021-28675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28676/</URL>
      <Description>SUSE CVE CVE-2021-28676 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28677/</URL>
      <Description>SUSE CVE CVE-2021-28677 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28678/</URL>
      <Description>SUSE CVE CVE-2021-28678 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python3-Pillow-7.2.0-150300.3.12.1">
      <FullProductName ProductID="python3-Pillow-7.2.0-150300.3.12.1">python3-Pillow-7.2.0-150300.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-Pillow-tk-7.2.0-150300.3.12.1">
      <FullProductName ProductID="python3-Pillow-tk-7.2.0-150300.3.12.1">python3-Pillow-tk-7.2.0-150300.3.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python3-Pillow-7.2.0-150300.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1">python3-Pillow-7.2.0-150300.3.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-Pillow-tk-7.2.0-150300.3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1">python3-Pillow-tk-7.2.0-150300.3.12.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.</Note>
    </Notes>
    <CVE>CVE-2021-25287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-25287.html</URL>
        <Description>CVE-2021-25287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185805</URL>
        <Description>SUSE Bug 1185805</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.</Note>
    </Notes>
    <CVE>CVE-2021-25288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-25288.html</URL>
        <Description>CVE-2021-25288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185803</URL>
        <Description>SUSE Bug 1185803</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.</Note>
    </Notes>
    <CVE>CVE-2021-28675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28675.html</URL>
        <Description>CVE-2021-28675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185804</URL>
        <Description>SUSE Bug 1185804</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.</Note>
    </Notes>
    <CVE>CVE-2021-28676</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28676.html</URL>
        <Description>CVE-2021-28676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185786</URL>
        <Description>SUSE Bug 1185786</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.</Note>
    </Notes>
    <CVE>CVE-2021-28677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28677.html</URL>
        <Description>CVE-2021-28677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185785</URL>
        <Description>SUSE Bug 1185785</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.</Note>
    </Notes>
    <CVE>CVE-2021-28678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.5:python3-Pillow-7.2.0-150300.3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python3-Pillow-tk-7.2.0-150300.3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241607-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28678.html</URL>
        <Description>CVE-2021-28678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185784</URL>
        <Description>SUSE Bug 1185784</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
