Bug 2087609 (CVE-2022-30595)
Summary: | CVE-2022-30595 python-pillow: heap buffer overflow in crafted TGA file | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | cstratak, epel-packagers-sig, infra-sig, manisandro, python-maint, python-sig, torsava |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | python-pillow 9.1.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A heap buffer overflow vulnerability was found in python-pillow. This security vulnerability occurs when reading a TGA file with RLE packets that cross scan lines, where pillow reads the information past the end of the first line without deducting that from the length of the remaining file data.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-13 11:50:04 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2087610, 2087611, 2087612, 2087613 | ||
Bug Blocks: | 2087614 |
Description
Sandipan Roy
2022-05-18 05:50:32 UTC
Created mingw-python-pillow tracking bugs for this issue: Affects: fedora-34 [bug 2087611] Affects: fedora-35 [bug 2087613] Created python-pillow tracking bugs for this issue: Affects: fedora-34 [bug 2087612] Affects: fedora-35 [bug 2087610] This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-30595 |