Bug 1382000 (CVE-2016-9189) - CVE-2016-9189 python-pillow: Integer overflows leading to memory disclosure in PyImaging_MapBuffer (Map.c)
Summary: CVE-2016-9189 python-pillow: Integer overflows leading to memory disclosure i...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-9189
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1380811
Blocks: 1382009
TreeView+ depends on / blocked
 
Reported: 2016-10-05 13:43 UTC by Adam Mariš
Modified: 2021-02-17 03:13 UTC (History)
6 users (show)

Fixed In Version: python-pillow 3.3.2
Doc Type: If docs needed, set a value
Doc Text:
A memory disclosure vulnerability was found in python-pillow. Functions in map.c failed to check for image overflow and check that an offset parameter was within bounds, allowing a crafted image to cause a crash or disclosure of memory.
Clone Of:
Environment:
Last Closed: 2016-12-12 01:48:08 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-10-05 13:43:54 UTC
Integer overflow vulnerabilities were found in PyImaging_MapBuffer function, specifically there's unchecked multiplication of xsize * ysize * bytes_per_pixel where the sizes are each an int as well as unchecked addition of the size calculated above with a attacker provided offset value.

Upstream patch:

https://github.com/python-pillow/Pillow/commit/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f

Comment 1 Adam Mariš 2016-10-05 13:52:22 UTC
Acknowledgments:

Name: the Pillow project

Comment 4 Doran Moppert 2016-12-12 02:05:45 UTC
Statement:

Red Hat Product Security has rated this issue as having Moderate security
impact. This issue is not currently planned to be addressed in future
updates. For additional information, refer to the Issue Severity
Classification: https://access.redhat.com/security/updates/classification/.


Note You need to log in before you can comment on or make changes to this bug.