Bug 2042511 (CVE-2022-22815)

Summary: CVE-2022-22815 python-pillow: improperly initializes ImagePath.Path in path_getbbox() in path.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, cstratak, epel-packagers-sig, infra-sig, manisandro, miminar, orion, python-maint, python-sig, torsava
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Pillow 9.0.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in python-pillow. The vulnerability occurs due to improper initialization of image paths, leading to improperly initializing the ImagePath. This flaw allows an attacker to access unauthorized memory that causes memory access errors, incorrect results, or crashes.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-06 03:15:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2042512, 2042513, 2042514, 2048363, 2048375    
Bug Blocks: 2042533    

Description Guilherme de Almeida Suckevicz 2022-01-19 16:17:16 UTC
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.

References:
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling

Comment 1 Guilherme de Almeida Suckevicz 2022-01-19 16:17:37 UTC
Created mingw-python-pillow tracking bugs for this issue:

Affects: fedora-all [bug 2042512]


Created python-pillow tracking bugs for this issue:

Affects: fedora-all [bug 2042513]


Created python3-pillow tracking bugs for this issue:

Affects: epel-7 [bug 2042514]

Comment 10 Product Security DevOps Team 2022-05-06 03:15:16 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-22815