Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1179354 - (CVE-2014-9601) CVE-2014-9601 python-pillow: potential denial-of-service during PNG decompression
CVE-2014-9601 python-pillow: potential denial-of-service during PNG decompres...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20141231,reported=2...
: Security
Depends On:
Blocks: 1179357
  Show dependency treegraph
 
Reported: 2015-01-06 10:13 EST by Vasyl Kaigorodov
Modified: 2015-01-19 03:50 EST (History)
4 users (show)

See Also:
Fixed In Version: Pillow 2.7.0
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-01-12 15:40:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vasyl Kaigorodov 2015-01-06 10:13:46 EST
Pillow release 2.7.0 fixes a potential denial-of-service issue in PNG decompression code [1].

Exact upstream commit that resolves this:
https://github.com/python-pillow/Pillow/commit/b3e09122e527ae554eb590741bbd7611d5710e40

[1]: http://pillow.readthedocs.org/releasenotes/2.7.0.html#png-text-chunk-size-limits
Comment 2 Vasyl Kaigorodov 2015-01-19 03:50:03 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-9601 to
the following vulnerability:

Name: CVE-2014-9601
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9601
Assigned: 20150116
Reference: https://www.djangoproject.com/weblog/2015/jan/02/pillow-security-release/

Pillow before 2.7.0 allows remote attackers to cause a denial of
service via a compressed text chunk in a PNG image that has a large
size when it is decompressed.

Note You need to log in before you can comment on or make changes to this bug.