ID UBUNTU_USN-4272-1.NASL Type nessus Reporter Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2020-02-07T00:00:00
Description
It was discovered that Pillow incorrectly handled certain images. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2019-16865, CVE-2019-19911)
It was discovered that Pillow incorrectly handled certain images. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-5312)
It was discovered that Pillow incorrectly handled certain TIFF images.
An attacker could possibly use this issue to cause a crash. This issue
only affected Ubuntu 19.10. (CVE-2020-5310)
It was discovered that Pillow incorrectly handled certain SGI images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10.
(CVE-2020-5311)
It was discovered that Pillow incorrectly handled certain PCX images.
An attackter could possibly use this issue to execute arbitrary code
or cause a crash. (CVE-2020-5312)
It was discovered that Pillow incorrectly handled certain Flip images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. (CVE-2020-5313).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-4272-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include("compat.inc");
if (description)
{
script_id(133550);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/07/14");
script_cve_id("CVE-2019-16865", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5312", "CVE-2020-5313");
script_xref(name:"USN", value:"4272-1");
script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS / 19.10 : pillow vulnerabilities (USN-4272-1)");
script_summary(english:"Checks dpkg output for updated packages.");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Ubuntu host is missing one or more security-related
patches."
);
script_set_attribute(
attribute:"description",
value:
"It was discovered that Pillow incorrectly handled certain images. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2019-16865, CVE-2019-19911)
It was discovered that Pillow incorrectly handled certain images. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-5312)
It was discovered that Pillow incorrectly handled certain TIFF images.
An attacker could possibly use this issue to cause a crash. This issue
only affected Ubuntu 19.10. (CVE-2020-5310)
It was discovered that Pillow incorrectly handled certain SGI images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10.
(CVE-2020-5311)
It was discovered that Pillow incorrectly handled certain PCX images.
An attackter could possibly use this issue to execute arbitrary code
or cause a crash. (CVE-2020-5312)
It was discovered that Pillow incorrectly handled certain Flip images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. (CVE-2020-5313).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://usn.ubuntu.com/4272-1/"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-5312");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python-imaging");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python-pil");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python3-imaging");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python3-pil");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:19.10");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/04");
script_set_attribute(attribute:"patch_publication_date", value:"2020/02/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/07");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Ubuntu Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("ubuntu.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Ubuntu/release");
if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
release = chomp(release);
if (! preg(pattern:"^(14\.04|16\.04|18\.04|19\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 14.04 / 16.04 / 18.04 / 19.10", "Ubuntu " + release);
if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
flag = 0;
if (ubuntu_check(osver:"16.04", pkgname:"python-imaging", pkgver:"3.1.2-0ubuntu1.3")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"python-pil", pkgver:"3.1.2-0ubuntu1.3")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"python3-pil", pkgver:"3.1.2-0ubuntu1.3")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"python-pil", pkgver:"5.1.0-1ubuntu0.2")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"python3-pil", pkgver:"5.1.0-1ubuntu0.2")) flag++;
if (ubuntu_check(osver:"19.10", pkgname:"python-pil", pkgver:"6.1.0-1ubuntu0.2")) flag++;
if (ubuntu_check(osver:"19.10", pkgname:"python3-pil", pkgver:"6.1.0-1ubuntu0.2")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-imaging / python-pil / python3-imaging / python3-pil");
}
{"id": "UBUNTU_USN-4272-1.NASL", "bulletinFamily": "scanner", "title": "Ubuntu 16.04 LTS / 18.04 LTS / 19.10 : pillow vulnerabilities (USN-4272-1)", "description": "It was discovered that Pillow incorrectly handled certain images. An\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2019-16865, CVE-2019-19911)\n\nIt was discovered that Pillow incorrectly handled certain images. An\nattacker could possibly use this issue to execute arbitrary code.\n(CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain TIFF images.\nAn attacker could possibly use this issue to cause a crash. This issue\nonly affected Ubuntu 19.10. (CVE-2020-5310)\n\nIt was discovered that Pillow incorrectly handled certain SGI images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10.\n(CVE-2020-5311)\n\nIt was discovered that Pillow incorrectly handled certain PCX images.\nAn attackter could possibly use this issue to execute arbitrary code\nor cause a crash. (CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain Flip images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. (CVE-2020-5313).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2020-02-07T00:00:00", "modified": "2020-02-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/133550", "reporter": "Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://usn.ubuntu.com/4272-1/"], "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "type": "nessus", "lastseen": "2020-07-15T13:43:39", "edition": 8, "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "ubuntu", "idList": ["USN-4272-1"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310892057", "OPENVAS:1361412562310883190", "OPENVAS:1361412562310844332", "OPENVAS:1361412562310883206", "OPENVAS:1361412562310877400", "OPENVAS:1361412562310877495", "OPENVAS:1361412562311220201707", "OPENVAS:1361412562311220201589", "OPENVAS:1361412562310704631", "OPENVAS:1361412562311220201128"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2020-0580.NASL", "EULEROS_SA-2020-2080.NASL", "REDHAT-RHSA-2020-0580.NASL", "FEDORA_2020-5CDBB19CCA.NASL", "DEBIAN_DSA-4631.NASL", "DEBIAN_DLA-2057.NASL", "EULEROS_SA-2020-2389.NASL", "FEDORA_2020-DF444E464E.NASL", "REDHAT-RHSA-2020-0566.NASL", "FREEBSD_PKG_0700E76C3EB011EA84783085A9A95629.NASL"]}, {"type": "freebsd", "idList": ["998CA824-EF55-11E9-B81F-3085A9A95629", "0700E76C-3EB0-11EA-8478-3085A9A95629"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2057-1:044B0", "DEBIAN:DSA-4631-1:EFD0A"]}, {"type": "fedora", "idList": ["FEDORA:2B968606CE9E", "FEDORA:E732667229A1", "FEDORA:08FE560A8A1D", "FEDORA:D4416604E91A"]}, {"type": "cve", "idList": ["CVE-2020-5312", "CVE-2020-5310", "CVE-2019-19911", "CVE-2020-5313", "CVE-2019-16865", "CVE-2020-5311"]}, {"type": "redhat", "idList": ["RHSA-2020:0681", "RHSA-2020:0898", "RHSA-2020:0683", "RHSA-2020:0694", "RHSA-2020:0580", "RHSA-2020:3887", "RHSA-2020:0578", "RHSA-2020:3185", "RHSA-2020:0566"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-0580", "ELSA-2020-3185", "ELSA-2020-0578", "ELSA-2020-0898", "ELSA-2020-3887"]}, {"type": "centos", "idList": ["CESA-2020:3887", "CESA-2020:0898", "CESA-2020:0578"]}, {"type": "amazon", "idList": ["ALAS2-2020-1542", "ALAS2-2020-1412"]}, {"type": "github", "idList": ["GHSA-J7MJ-748X-7P78", "GHSA-5GM3-PX64-RW72", "GHSA-HJ69-C76V-86WR"]}], "modified": "2020-07-15T13:43:39", "rev": 2}, "score": {"value": 7.0, "vector": "NONE", "modified": "2020-07-15T13:43:39", "rev": 2}, "vulnersScore": 7.0}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4272-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133550);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-16865\", \"CVE-2019-19911\", \"CVE-2020-5310\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_xref(name:\"USN\", value:\"4272-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS / 19.10 : pillow vulnerabilities (USN-4272-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that Pillow incorrectly handled certain images. An\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2019-16865, CVE-2019-19911)\n\nIt was discovered that Pillow incorrectly handled certain images. An\nattacker could possibly use this issue to execute arbitrary code.\n(CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain TIFF images.\nAn attacker could possibly use this issue to cause a crash. This issue\nonly affected Ubuntu 19.10. (CVE-2020-5310)\n\nIt was discovered that Pillow incorrectly handled certain SGI images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10.\n(CVE-2020-5311)\n\nIt was discovered that Pillow incorrectly handled certain PCX images.\nAn attackter could possibly use this issue to execute arbitrary code\nor cause a crash. (CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain Flip images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. (CVE-2020-5313).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4272-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python-imaging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python-pil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python3-imaging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python3-pil\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:19.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|18\\.04|19\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 18.04 / 19.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"python-imaging\", pkgver:\"3.1.2-0ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"python-pil\", pkgver:\"3.1.2-0ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"python3-pil\", pkgver:\"3.1.2-0ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"python-pil\", pkgver:\"5.1.0-1ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"python3-pil\", pkgver:\"5.1.0-1ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"python-pil\", pkgver:\"6.1.0-1ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"19.10\", pkgname:\"python3-pil\", pkgver:\"6.1.0-1ubuntu0.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-imaging / python-pil / python3-imaging / python3-pil\");\n}\n", "naslFamily": "Ubuntu Local Security Checks", "pluginID": "133550", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04", "p-cpe:/a:canonical:ubuntu_linux:python3-imaging", "p-cpe:/a:canonical:ubuntu_linux:python-pil", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:python3-pil", "cpe:/o:canonical:ubuntu_linux:19.10", "p-cpe:/a:canonical:ubuntu_linux:python-imaging", "cpe:/o:canonical:ubuntu_linux:14.04"], "scheme": null, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}
{"ubuntu": [{"lastseen": "2020-07-11T11:49:36", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "description": "It was discovered that Pillow incorrectly handled certain images. \nAn attacker could possibly use this issue to cause a denial of service. \n(CVE-2019-16865, CVE-2019-19911)\n\nIt was discovered that Pillow incorrectly handled certain images. \nAn attacker could possibly use this issue to execute arbitrary code. \n(CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain TIFF images. \nAn attacker could possibly use this issue to cause a crash. This issue \nonly affected Ubuntu 19.10. (CVE-2020-5310)\n\nIt was discovered that Pillow incorrectly handled certain SGI images. \nAn attacker could possibly use this issue to execute arbitrary code or \ncause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10. \n(CVE-2020-5311)\n\nIt was discovered that Pillow incorrectly handled certain PCX images. \nAn attackter could possibly use this issue to execute arbitrary code or \ncause a crash. (CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain Flip images. \nAn attacker could possibly use this issue to execute arbitrary code or \ncause a crash. (CVE-2020-5313)", "edition": 3, "modified": "2020-02-06T00:00:00", "published": "2020-02-06T00:00:00", "id": "USN-4272-1", "href": "https://ubuntu.com/security/notices/USN-4272-1", "title": "Pillow vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2020-07-21T20:03:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-02-07T00:00:00", "id": "OPENVAS:1361412562310844332", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844332", "type": "openvas", "title": "Ubuntu: Security Advisory for pillow (USN-4272-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844332\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2019-16865\", \"CVE-2019-19911\", \"CVE-2020-5312\", \"CVE-2020-5310\", \"CVE-2020-5311\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-07 04:00:18 +0000 (Fri, 07 Feb 2020)\");\n script_name(\"Ubuntu: Security Advisory for pillow (USN-4272-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4272-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-February/005320.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pillow'\n package(s) announced via the USN-4272-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that Pillow incorrectly handled certain images.\nAn attacker could possibly use this issue to cause a denial of service.\n(CVE-2019-16865, CVE-2019-19911)\n\nIt was discovered that Pillow incorrectly handled certain images.\nAn attacker could possibly use this issue to execute arbitrary code.\n(CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain TIFF images.\nAn attacker could possibly use this issue to cause a crash. This issue\nonly affected Ubuntu 19.10. (CVE-2020-5310)\n\nIt was discovered that Pillow incorrectly handled certain SGI images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. This issue only affected Ubuntu 18.04 and Ubuntu 19.10.\n(CVE-2020-5311)\n\nIt was discovered that Pillow incorrectly handled certain PCX images.\nAn attackter could possibly use this issue to execute arbitrary code or\ncause a crash. (CVE-2020-5312)\n\nIt was discovered that Pillow incorrectly handled certain Flip images.\nAn attacker could possibly use this issue to execute arbitrary code or\ncause a crash. (CVE-2020-5313)\");\n\n script_tag(name:\"affected\", value:\"'pillow' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"6.1.0-1ubuntu0.2\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"6.1.0-1ubuntu0.2\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"5.1.0-1ubuntu0.2\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"5.1.0-1ubuntu0.2\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"python-imaging\", ver:\"3.1.2-0ubuntu1.3\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"3.1.2-0ubuntu1.3\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"3.1.2-0ubuntu1.3\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:48:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-02-22T00:00:00", "id": "OPENVAS:1361412562310877495", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877495", "type": "openvas", "title": "Fedora: Security Advisory for python-pillow (FEDORA-2020-5cdbb19cca)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877495\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2020-5313\", \"CVE-2020-5312\", \"CVE-2020-5311\", \"CVE-2020-5310\", \"CVE-2019-19911\", \"CVE-2019-16865\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-22 04:03:36 +0000 (Sat, 22 Feb 2020)\");\n script_name(\"Fedora: Security Advisory for python-pillow (FEDORA-2020-5cdbb19cca)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC30\");\n\n script_xref(name:\"FEDORA\", value:\"2020-5cdbb19cca\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'python-pillow'\n package(s) announced via the FEDORA-2020-5cdbb19cca advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Python image processing library, fork of the Python Imaging Library (PIL)\n\nThis library provides extensive file format support, an efficient\ninternal representation, and powerful image processing capabilities.\n\nThere are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt),\ndevel (development) and doc (documentation).\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Fedora 30.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC30\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow\", rpm:\"python-pillow~5.4.1~4.fc30\", rls:\"FC30\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:07:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5311", "CVE-2020-5313"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-02-23T00:00:00", "id": "OPENVAS:1361412562310704631", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704631", "type": "openvas", "title": "Debian: Security Advisory for pillow (DSA-4631-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704631\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2019-16865\", \"CVE-2019-19911\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-23 04:00:11 +0000 (Sun, 23 Feb 2020)\");\n script_name(\"Debian: Security Advisory for pillow (DSA-4631-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(10|9)\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4631.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4631-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pillow'\n package(s) announced via the DSA-4631-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple security issues were discovered in Pillow, a Python imaging\nlibrary, which could result in denial of service and potentially the\nexecution of arbitrary code if malformed PCX, FLI, SGI or TIFF images\nare processed.\");\n\n script_tag(name:\"affected\", value:\"'pillow' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the oldstable distribution (stretch), these problems have been fixed\nin version 4.0.0-4+deb9u1.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 5.4.1-2+deb10u1.\n\nWe recommend that you upgrade your pillow packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-dbg\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-doc\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk-dbg\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil-dbg\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk-dbg\", ver:\"5.4.1-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-imaging\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-dbg\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-doc\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk-dbg\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil-dbg\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk-dbg\", ver:\"4.0.0-4+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:49:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310877400", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877400", "type": "openvas", "title": "Fedora: Security Advisory for python-pillow (FEDORA-2020-df444e464e)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877400\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2020-5313\", \"CVE-2020-5312\", \"CVE-2020-5311\", \"CVE-2020-5310\", \"CVE-2019-16865\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-31 04:03:38 +0000 (Fri, 31 Jan 2020)\");\n script_name(\"Fedora: Security Advisory for python-pillow (FEDORA-2020-df444e464e)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-df444e464e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'python-pillow'\n package(s) announced via the FEDORA-2020-df444e464e advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Python image processing library, fork of the Python Imaging Library (PIL)\n\nThis library provides extensive file format support, an efficient\ninternal representation, and powerful image processing capabilities.\n\nThere are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt),\ndevel (development) and doc (documentation).\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow\", rpm:\"python-pillow~6.2.2~1.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:05:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5313"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-01-07T00:00:00", "id": "OPENVAS:1361412562310892057", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310892057", "type": "openvas", "title": "Debian LTS: Security Advisory for pillow (DLA-2057-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.892057\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2019-19911\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-07 03:00:10 +0000 (Tue, 07 Jan 2020)\");\n script_name(\"Debian LTS: Security Advisory for pillow (DLA-2057-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2020/01/msg00003.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-2057-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/948224\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pillow'\n package(s) announced via the DLA-2057-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that there were three vulnerabilities in Pillow, an\nimaging library for the Python programming language:\n\n * CVE-2019-19911: Prevent a denial-of-service vulnerability caused\nby FpxImagePlugin.py calling the range function on an unvalidated\n32-bit integer if the number of bands is large.\n\n * CVE-2020-5312: PCX 'P mode' buffer overflow.\n\n * CVE-2020-5313: FLI buffer overflow.\");\n\n script_tag(name:\"affected\", value:\"'pillow' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these issues have been fixed in pillow version\n2.6.1-2+deb8u4.\n\nWe recommend that you upgrade your pillow packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"python-imaging\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-imaging-tk\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil-doc\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-pil.imagetk-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-sane\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python-sane-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-pil.imagetk-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-sane\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"python3-sane-dbg\", ver:\"2.6.1-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:55:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2020-5313"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-14T00:00:00", "published": "2020-06-26T00:00:00", "id": "OPENVAS:1361412562311220201707", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201707", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1707)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1707\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2020-5312\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-26 07:27:48 +0000 (Fri, 26 Jun 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1707)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1707\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1707\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'python-pillow' package(s) announced via the EulerOS-SA-2020-1707 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.(CVE-2020-5313)\n\nlibImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.(CVE-2020-5312)\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python2-pillow\", rpm:\"python2-pillow~5.3.0~1.h2.eulerosv2r8\", rls:\"EULEROSVIRTARM64-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:55:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2020-5313"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-14T00:00:00", "published": "2020-05-26T00:00:00", "id": "OPENVAS:1361412562311220201589", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201589", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1589)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1589\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2020-5312\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-26 05:46:00 +0000 (Tue, 26 May 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1589)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP8\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1589\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1589\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'python-pillow' package(s) announced via the EulerOS-SA-2020-1589 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.(CVE-2020-5312)\n\n\n\nlibImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.(CVE-2020-5313)\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Huawei EulerOS V2.0SP8.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP8\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python2-pillow\", rpm:\"python2-pillow~5.3.0~1.h2.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python3-pillow\", rpm:\"python3-pillow~5.3.0~1.h2.eulerosv2r8\", rls:\"EULEROS-2.0SP8\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-02-26T16:49:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5313"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-02-24T00:00:00", "published": "2020-02-24T00:00:00", "id": "OPENVAS:1361412562311220201128", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201128", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1128)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1128\");\n script_version(\"2020-02-24T09:07:13+0000\");\n script_cve_id(\"CVE-2019-16865\", \"CVE-2020-5313\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-02-24 09:07:13 +0000 (Mon, 24 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-24 09:07:13 +0000 (Mon, 24 Feb 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1128)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1128\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1128\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'python-pillow' package(s) announced via the EulerOS-SA-2020-1128 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.(CVE-2019-16865)\n\nlibImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.(CVE-2020-5313)\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow\", rpm:\"python-pillow~2.0.0~19.h5.gitd1c6db8.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2020-07-21T20:05:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "The remote host is missing an update for the ", "modified": "2020-07-14T00:00:00", "published": "2020-02-27T00:00:00", "id": "OPENVAS:1361412562310883190", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310883190", "type": "openvas", "title": "CentOS: Security Advisory for python-pillow (CESA-2020:0578)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.883190\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2019-16865\", \"CVE-2020-5312\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-27 04:00:35 +0000 (Thu, 27 Feb 2020)\");\n script_name(\"CentOS: Security Advisory for python-pillow (CESA-2020:0578)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n\n script_xref(name:\"CESA\", value:\"2020:0578\");\n script_xref(name:\"URL\", value:\"https://lists.centos.org/pipermail/centos-announce/2020-February/035646.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'python-pillow'\n package(s) announced via the CESA-2020:0578 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The python-pillow packages contain a Python image processing library that\nprovides extensive file format support, an efficient internal\nrepresentation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n * python-pillow: improperly restricted operations on memory buffer in\nlibImaging/PcxDecode.c (CVE-2020-5312)\n\n * python-pillow: reading specially crafted image files leads to allocation\nof large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on CentOS 7.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"CentOS7\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow\", rpm:\"python-pillow~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow-devel\", rpm:\"python-pillow-devel~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow-doc\", rpm:\"python-pillow-doc~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow-qt\", rpm:\"python-pillow-qt~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow-sane\", rpm:\"python-pillow-sane~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow-tk\", rpm:\"python-pillow-tk~2.0.0~20.gitd1c6db8.el7_7\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:00:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-14T00:00:00", "published": "2020-07-03T00:00:00", "id": "OPENVAS:1361412562311220201728", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201728", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1728)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1728\");\n script_version(\"2020-07-14T13:08:55+0000\");\n script_cve_id(\"CVE-2020-5312\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-14 13:08:55 +0000 (Tue, 14 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 06:19:00 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for python-pillow (EulerOS-SA-2020-1728)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1728\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1728\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'python-pillow' package(s) announced via the EulerOS-SA-2020-1728 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.(CVE-2020-5312)\");\n\n script_tag(name:\"affected\", value:\"'python-pillow' package(s) on Huawei EulerOS Virtualization 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"python-pillow\", rpm:\"python-pillow~2.0.0~19.h6.gitd1c6db8.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2020-07-15T10:24:40", "description": "Pillow developers report :\n\nThis release addresses several security problems, as well as\naddressing CVE-2019-19911.\n\nCVE-2019-19911 is regarding FPX images. If an image reports that it\nhas a large number of bands, a large amount of resources will be used\nwhen trying to process the image. This is fixed by limiting the number\nof bands to those usable by Pillow.\n\nBuffer overruns were found when processing an SGI, PCX or FLI image.\nChecks have been added to prevent this.\n\nOverflow checks have been added when calculating the size of a memory\nblock to be reallocated in the processing of a TIFF image.", "edition": 9, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-27T00:00:00", "title": "FreeBSD : Pillow -- Multiple vulnerabilities (0700e76c-3eb0-11ea-8478-3085a9a95629)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "modified": "2020-01-27T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:py27-pillow", "p-cpe:/a:freebsd:freebsd:py37-pillow", "p-cpe:/a:freebsd:freebsd:py35-pillow", "p-cpe:/a:freebsd:freebsd:py38-pillow", "p-cpe:/a:freebsd:freebsd:py36-pillow"], "id": "FREEBSD_PKG_0700E76C3EB011EA84783085A9A95629.NASL", "href": "https://www.tenable.com/plugins/nessus/133243", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133243);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-19911\", \"CVE-2020-5310\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n\n script_name(english:\"FreeBSD : Pillow -- Multiple vulnerabilities (0700e76c-3eb0-11ea-8478-3085a9a95629)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Pillow developers report :\n\nThis release addresses several security problems, as well as\naddressing CVE-2019-19911.\n\nCVE-2019-19911 is regarding FPX images. If an image reports that it\nhas a large number of bands, a large amount of resources will be used\nwhen trying to process the image. This is fixed by limiting the number\nof bands to those usable by Pillow.\n\nBuffer overruns were found when processing an SGI, PCX or FLI image.\nChecks have been added to prevent this.\n\nOverflow checks have been added when calculating the size of a memory\nblock to be reallocated in the processing of a TIFF image.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243336\"\n );\n # https://vuxml.freebsd.org/freebsd/0700e76c-3eb0-11ea-8478-3085a9a95629.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?70144fbb\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py27-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py35-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py36-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py37-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:py38-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/12/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"py27-pillow<6.2.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py35-pillow<6.2.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py36-pillow<6.2.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py37-pillow<6.2.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"py38-pillow<6.2.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-15T10:18:26", "description": "Backport patches for CVE-2020-5313, CVE-2020-5312, CVE-2020-5311,\nCVE-2020-5310, CVE-2019-19911\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 2, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-24T00:00:00", "title": "Fedora 30 : python-pillow (2020-5cdbb19cca)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "modified": "2020-02-24T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:30", "p-cpe:/a:fedoraproject:fedora:python-pillow"], "id": "FEDORA_2020-5CDBB19CCA.NASL", "href": "https://www.tenable.com/plugins/nessus/133887", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2020-5cdbb19cca.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133887);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-19911\", \"CVE-2020-5310\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_xref(name:\"FEDORA\", value:\"2020-5cdbb19cca\");\n\n script_name(english:\"Fedora 30 : python-pillow (2020-5cdbb19cca)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Backport patches for CVE-2020-5313, CVE-2020-5312, CVE-2020-5311,\nCVE-2020-5310, CVE-2019-19911\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2020-5cdbb19cca\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected python-pillow package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:30\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^30([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 30\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC30\", reference:\"python-pillow-5.4.1-4.fc30\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-pillow\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-15T09:34:57", "description": "Multiple security issues were discovered in Pillow, a Python imaging\nlibrary, which could result in denial of service and potentially the\nexecution of arbitrary code if malformed PCX, FLI, SGI or TIFF images\nare processed.", "edition": 2, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-24T00:00:00", "title": "Debian DSA-4631-1 : pillow - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5311", "CVE-2020-5313"], "modified": "2020-02-24T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:10.0", "p-cpe:/a:debian:debian_linux:pillow", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4631.NASL", "href": "https://www.tenable.com/plugins/nessus/133879", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4631. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133879);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-16865\", \"CVE-2019-19911\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_xref(name:\"DSA\", value:\"4631\");\n\n script_name(english:\"Debian DSA-4631-1 : pillow - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Multiple security issues were discovered in Pillow, a Python imaging\nlibrary, which could result in denial of service and potentially the\nexecution of arbitrary code if malformed PCX, FLI, SGI or TIFF images\nare processed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/pillow\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/pillow\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/pillow\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2020/dsa-4631\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade the pillow packages.\n\nFor the oldstable distribution (stretch), these problems have been\nfixed in version 4.0.0-4+deb9u1.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 5.4.1-2+deb10u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"python-pil\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python-pil-dbg\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python-pil-doc\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python-pil.imagetk\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python-pil.imagetk-dbg\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python3-pil\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python3-pil-dbg\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python3-pil.imagetk\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"python3-pil.imagetk-dbg\", reference:\"5.4.1-2+deb10u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-imaging\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-pil\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-pil-dbg\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-pil-doc\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-pil.imagetk\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python-pil.imagetk-dbg\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python3-pil\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python3-pil-dbg\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python3-pil.imagetk\", reference:\"4.0.0-4+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"python3-pil.imagetk-dbg\", reference:\"4.0.0-4+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-15T10:21:50", "description": "Update to 6.2.2, fixes CVE-2020-5313, CVE-2020-5312, CVE-2020-5311,\nCVE-2020-5310.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 9, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-01-31T00:00:00", "title": "Fedora 31 : python-pillow (2020-df444e464e)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "modified": "2020-01-31T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-pillow", "cpe:/o:fedoraproject:fedora:31"], "id": "FEDORA_2020-DF444E464E.NASL", "href": "https://www.tenable.com/plugins/nessus/133376", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2020-df444e464e.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133376);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2020-5310\", \"CVE-2020-5311\", \"CVE-2020-5312\", \"CVE-2020-5313\");\n script_xref(name:\"FEDORA\", value:\"2020-df444e464e\");\n\n script_name(english:\"Fedora 31 : python-pillow (2020-df444e464e)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Update to 6.2.2, fixes CVE-2020-5313, CVE-2020-5312, CVE-2020-5311,\nCVE-2020-5310.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2020-df444e464e\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected python-pillow package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:31\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^31([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 31\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC31\", reference:\"python-pillow-6.2.2-1.fc31\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-pillow\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:42:02", "description": "It was discovered that there were three vulnerabilities in Pillow, an\nimaging library for the Python programming language :\n\n - CVE-2019-19911: Prevent a denial of service\n vulnerability caused by FpxImagePlugin.py calling the\n range function on an unvalidated 32-bit integer if the\n number of bands is large.\n\n - CVE-2020-5312: PCX 'P mode' buffer overflow.\n\n - CVE-2020-5313: FLI buffer overflow.\n\nFor Debian 8 'Jessie', these issues have been fixed in pillow version\n2.6.1-2+deb8u4.\n\nWe recommend that you upgrade your pillow packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 13, "published": "2020-01-07T00:00:00", "title": "Debian DLA-2057-1 : pillow security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5313"], "modified": "2020-01-07T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:python-imaging", "p-cpe:/a:debian:debian_linux:python-pil.imagetk-dbg", "p-cpe:/a:debian:debian_linux:python3-pil", "cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:python-sane-dbg", "p-cpe:/a:debian:debian_linux:python3-sane", "p-cpe:/a:debian:debian_linux:python-pil-doc", "p-cpe:/a:debian:debian_linux:python-pil-dbg", "p-cpe:/a:debian:debian_linux:python3-pil-dbg", "p-cpe:/a:debian:debian_linux:python-sane", "p-cpe:/a:debian:debian_linux:python3-pil.imagetk-dbg", "p-cpe:/a:debian:debian_linux:python-pil.imagetk", "p-cpe:/a:debian:debian_linux:python3-sane-dbg", "p-cpe:/a:debian:debian_linux:python-imaging-tk", "p-cpe:/a:debian:debian_linux:python-pil", "p-cpe:/a:debian:debian_linux:python3-pil.imagetk"], "id": "DEBIAN_DLA-2057.NASL", "href": "https://www.tenable.com/plugins/nessus/132681", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2057-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132681);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_name(english:\"Debian DLA-2057-1 : pillow security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that there were three vulnerabilities in Pillow, an\nimaging library for the Python programming language :\n\n - CVE-2019-19911: Prevent a denial of service\n vulnerability caused by FpxImagePlugin.py calling the\n range function on an unvalidated 32-bit integer if the\n number of bands is large.\n\n - CVE-2020-5312: PCX 'P mode' buffer overflow.\n\n - CVE-2020-5313: FLI buffer overflow.\n\nFor Debian 8 'Jessie', these issues have been fixed in pillow version\n2.6.1-2+deb8u4.\n\nWe recommend that you upgrade your pillow packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2020/01/msg00003.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/pillow\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-imaging\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-imaging-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-pil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-pil-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-pil-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-pil.imagetk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-pil.imagetk-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-sane\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python-sane-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-pil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-pil-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-pil.imagetk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-pil.imagetk-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-sane\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:python3-sane-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"python-imaging\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-imaging-tk\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-pil\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-pil-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-pil-doc\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-pil.imagetk\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-pil.imagetk-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-sane\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python-sane-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-pil\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-pil-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-pil.imagetk\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-pil.imagetk-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-sane\", reference:\"2.6.1-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"python3-sane-dbg\", reference:\"2.6.1-2+deb8u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-19T05:27:14", "description": "An update for python-pillow is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/ SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "edition": 2, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-02-24T00:00:00", "title": "RHEL 8 : python-pillow (RHSA-2020:0566)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5311"], "modified": "2020-02-24T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python3-pillow", "p-cpe:/a:redhat:enterprise_linux:python-pillow-debugsource", "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0"], "id": "REDHAT-RHSA-2020-0566.NASL", "href": "https://www.tenable.com/plugins/nessus/133944", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0566. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(133944);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2019-16865\", \"CVE-2020-5311\", \"CVE-2020-5312\");\n script_xref(name:\"RHSA\", value:\"2020:0566\");\n\n script_name(english:\"RHEL 8 : python-pillow (RHSA-2020:0566)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update for python-pillow is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/ SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/119.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/770.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/787.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-16865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-5311\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-5312\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:0566\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1774066\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1789533\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1789535\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected python-pillow-debugsource and / or python3-pillow packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(119, 770, 787);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.0::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pillow-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-pillow\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'rhel_e4s_8_0_appstream': [\n 'rhel-8-for-x86_64-appstream-e4s-debug-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:0566');\n}\n\npkgs = [\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']},\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']},\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_appstream']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'python-pillow-debugsource / python3-pillow');\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-15T12:23:42", "description": "From Red Hat Security Advisory 2020:0580 :\n\nAn update for python-pillow is now available for Red Hat Enterprise\nLinux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library\nthat provides extensive file format support, an efficient internal\nrepresentation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/\nSgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in\nlibImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to\nallocation of large amounts of memory and denial of service\n(CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.", "edition": 2, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-26T00:00:00", "title": "Oracle Linux 8 : python-pillow (ELSA-2020-0580)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5311"], "modified": "2020-02-26T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:python3-pillow", "cpe:/o:oracle:linux:8"], "id": "ORACLELINUX_ELSA-2020-0580.NASL", "href": "https://www.tenable.com/plugins/nessus/134059", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0580 and \n# Oracle Linux Security Advisory ELSA-2020-0580 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(134059);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/14\");\n\n script_cve_id(\"CVE-2019-16865\", \"CVE-2020-5311\", \"CVE-2020-5312\");\n script_xref(name:\"RHSA\", value:\"2020:0580\");\n\n script_name(english:\"Oracle Linux 8 : python-pillow (ELSA-2020-0580)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2020:0580 :\n\nAn update for python-pillow is now available for Red Hat Enterprise\nLinux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library\nthat provides extensive file format support, an efficient internal\nrepresentation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/\nSgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in\nlibImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to\nallocation of large amounts of memory and denial of service\n(CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2020-February/009660.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected python-pillow package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python3-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 8\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"python3-pillow-5.1.1-10.el8_1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python3-pillow\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-19T05:27:20", "description": "An update for python-pillow is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/ SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "edition": 2, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-02-25T00:00:00", "title": "RHEL 8 : python-pillow (RHSA-2020:0580)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5311"], "modified": "2020-02-25T00:00:00", "cpe": ["cpe:/o:redhat:rhel_eus:8.1", "cpe:/o:redhat:rhel_tus:8.2", "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.4", "p-cpe:/a:redhat:enterprise_linux:python3-pillow", "cpe:/a:redhat:rhel_eus:8.4::appstream", "p-cpe:/a:redhat:enterprise_linux:python-pillow-debugsource", "cpe:/o:redhat:rhel_e4s:8.2", "cpe:/o:redhat:rhel_e4s:8.1", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:rhel_aus:8.2", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_eus:8.2", "cpe:/a:redhat:rhel_eus:8.2::appstream"], "id": "REDHAT-RHSA-2020-0580.NASL", "href": "https://www.tenable.com/plugins/nessus/134034", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0580. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(134034);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2019-16865\", \"CVE-2020-5311\", \"CVE-2020-5312\");\n script_xref(name:\"RHSA\", value:\"2020:0580\");\n\n script_name(english:\"RHEL 8 : python-pillow (RHSA-2020:0580)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update for python-pillow is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es) :\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/ SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/119.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/770.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/787.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-16865\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-5311\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-5312\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:0580\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1774066\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1789533\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1789535\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected python-pillow-debugsource and / or python3-pillow packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-5312\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(119, 770, 787);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.1::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.1::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::appstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-pillow-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-pillow\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'enterprise_linux_8_appstream': [\n 'rhel-8-for-aarch64-appstream-debug-rpms',\n 'rhel-8-for-aarch64-appstream-rpms',\n 'rhel-8-for-aarch64-appstream-source-rpms',\n 'rhel-8-for-s390x-appstream-debug-rpms',\n 'rhel-8-for-s390x-appstream-rpms',\n 'rhel-8-for-s390x-appstream-source-rpms',\n 'rhel-8-for-x86_64-appstream-debug-rpms',\n 'rhel-8-for-x86_64-appstream-rpms',\n 'rhel-8-for-x86_64-appstream-source-rpms'\n ],\n 'rhel_e4s_8_1_appstream': [\n 'rhel-8-for-x86_64-appstream-e4s-debug-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-source-rpms'\n ],\n 'rhel_eus_8_1_appstream': [\n 'rhel-8-for-aarch64-appstream-eus-debug-rpms',\n 'rhel-8-for-aarch64-appstream-eus-rpms',\n 'rhel-8-for-aarch64-appstream-eus-source-rpms',\n 'rhel-8-for-s390x-appstream-eus-debug-rpms',\n 'rhel-8-for-s390x-appstream-eus-rpms',\n 'rhel-8-for-s390x-appstream-eus-source-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-debug-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-source-rpms',\n 'rhel-8-for-x86_64-appstream-eus-debug-rpms',\n 'rhel-8-for-x86_64-appstream-eus-rpms',\n 'rhel-8-for-x86_64-appstream-eus-source-rpms'\n ],\n 'rhel_eus_8_2_appstream': [\n 'rhel-8-for-aarch64-appstream-eus-debug-rpms',\n 'rhel-8-for-aarch64-appstream-eus-rpms',\n 'rhel-8-for-aarch64-appstream-eus-source-rpms',\n 'rhel-8-for-s390x-appstream-eus-debug-rpms',\n 'rhel-8-for-s390x-appstream-eus-rpms',\n 'rhel-8-for-s390x-appstream-eus-source-rpms',\n 'rhel-8-for-x86_64-appstream-aus-debug-rpms',\n 'rhel-8-for-x86_64-appstream-aus-rpms',\n 'rhel-8-for-x86_64-appstream-aus-source-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-debug-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-rpms',\n 'rhel-8-for-x86_64-appstream-e4s-source-rpms',\n 'rhel-8-for-x86_64-appstream-eus-debug-rpms',\n 'rhel-8-for-x86_64-appstream-eus-rpms',\n 'rhel-8-for-x86_64-appstream-eus-source-rpms',\n 'rhel-8-for-x86_64-appstream-tus-debug-rpms',\n 'rhel-8-for-x86_64-appstream-tus-rpms',\n 'rhel-8-for-x86_64-appstream-tus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:0580');\n}\n\npkgs = [\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']},\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']},\n {'reference':'python-pillow-debugsource-5.1.1-10.el8_1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']},\n {'reference':'python3-pillow-5.1.1-10.el8_1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_appstream', 'rhel_e4s_8_1_appstream', 'rhel_eus_8_1_appstream', 'rhel_eus_8_2_appstream']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'python-pillow-debugsource / python3-pillow');\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:06:57", "description": "According to the versions of the python-pillow package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in Pillow before 6.2.0. When\n reading specially crafted invalid image files, the\n library can either allocate very large amounts of\n memory or take an extremely long period of time to\n process the image.(CVE-2019-16865)\n\n - libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX\n P mode buffer overflow.(CVE-2020-5312)\n\n - libImaging/FliDecode.c in Pillow before 6.2.2 has an\n FLI buffer overflow.(CVE-2020-5313)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-03T00:00:00", "title": "EulerOS 2.0 SP2 : python-pillow (EulerOS-SA-2020-2389)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5313"], "modified": "2020-11-03T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:python-pillow", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-2389.NASL", "href": "https://www.tenable.com/plugins/nessus/142354", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142354);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-16865\",\n \"CVE-2020-5312\",\n \"CVE-2020-5313\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : python-pillow (EulerOS-SA-2020-2389)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the python-pillow package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in Pillow before 6.2.0. When\n reading specially crafted invalid image files, the\n library can either allocate very large amounts of\n memory or take an extremely long period of time to\n process the image.(CVE-2019-16865)\n\n - libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX\n P mode buffer overflow.(CVE-2020-5312)\n\n - libImaging/FliDecode.c in Pillow before 6.2.2 has an\n FLI buffer overflow.(CVE-2020-5313)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2389\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?be86ca35\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected python-pillow packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"python-pillow-2.0.0-19.gitd1c6db8.h4\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-pillow\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:06:21", "description": "According to the versions of the python-pillow package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Integer overflow in the ImagingResampleHorizontal\n function in libImaging/Resample.c in Pillow before\n 3.1.1 allows remote attackers to have unspecified\n impact via negative values of the new size, which\n triggers a heap-based buffer overflow.(CVE-2016-4009)\n\n - An issue was discovered in Pillow before 6.2.0. When\n reading specially crafted invalid image files, the\n library can either allocate very large amounts of\n memory or take an extremely long period of time to\n process the image.(CVE-2019-16865)\n\n - libImaging/FliDecode.c in Pillow before 6.2.2 has an\n FLI buffer overflow.(CVE-2020-5313)\n\n - libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX\n P mode buffer overflow.(CVE-2020-5312)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-09-28T00:00:00", "title": "EulerOS 2.0 SP3 : python-pillow (EulerOS-SA-2020-2080)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-16865", "CVE-2016-4009", "CVE-2020-5312", "CVE-2020-5313"], "modified": "2020-09-28T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:python-pillow", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-2080.NASL", "href": "https://www.tenable.com/plugins/nessus/140847", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140847);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2016-4009\",\n \"CVE-2019-16865\",\n \"CVE-2020-5312\",\n \"CVE-2020-5313\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : python-pillow (EulerOS-SA-2020-2080)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the python-pillow package installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - Integer overflow in the ImagingResampleHorizontal\n function in libImaging/Resample.c in Pillow before\n 3.1.1 allows remote attackers to have unspecified\n impact via negative values of the new size, which\n triggers a heap-based buffer overflow.(CVE-2016-4009)\n\n - An issue was discovered in Pillow before 6.2.0. When\n reading specially crafted invalid image files, the\n library can either allocate very large amounts of\n memory or take an extremely long period of time to\n process the image.(CVE-2019-16865)\n\n - libImaging/FliDecode.c in Pillow before 6.2.2 has an\n FLI buffer overflow.(CVE-2020-5313)\n\n - libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX\n P mode buffer overflow.(CVE-2020-5312)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2080\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?373af504\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected python-pillow packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-pillow\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"python-pillow-2.0.0-19.gitd1c6db8.h3\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-pillow\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2020-07-11T11:25:52", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5313"], "description": "\nPillow developers report:\n\n\n\t This release addresses several security problems, as well as\n\t addressing CVE-2019-19911.\n\t \n\t CVE-2019-19911 is regarding FPX images. If an image reports that it\n\t has a large number of bands, a large amount of resources will be\n\t used when trying to process the image. This is fixed by limiting the\n\t number of bands to those usable by Pillow.\n\t \n\t Buffer overruns were found when processing an SGI, PCX or FLI image.\n\t Checks have been added to prevent this.\n\t \n\t Overflow checks have been added when calculating the size of a\n\t memory block to be reallocated in the processing of a TIFF image.\n\t \n\n", "edition": 2, "modified": "2019-12-19T00:00:00", "published": "2019-12-19T00:00:00", "id": "0700E76C-3EB0-11EA-8478-3085A9A95629", "href": "https://vuxml.freebsd.org/freebsd/0700e76c-3eb0-11ea-8478-3085a9a95629.html", "title": "Pillow -- Multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-16T14:26:35", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865"], "description": "\nMitre reports:\n\nAn issue was discovered in Pillow before 6.2.0. When reading specially\n\t crafted invalid image files, the library can either allocate very large\n\t amounts of memory or take an extremely long period of time to process\n\t the image.\n\n", "edition": 2, "modified": "2019-09-24T00:00:00", "published": "2019-09-24T00:00:00", "id": "998CA824-EF55-11E9-B81F-3085A9A95629", "href": "https://vuxml.freebsd.org/freebsd/998ca824-ef55-11e9-b81f-3085a9a95629.html", "title": "Pillow -- Allocation of resources without limits or throttling", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "debian": [{"lastseen": "2021-01-11T01:18:31", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5311", "CVE-2020-5313"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4631-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nFebruary 21, 2020 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : pillow\nCVE ID : CVE-2019-16865 CVE-2019-19911 CVE-2020-5311\n CVE-2020-5312 CVE-2020-5313\n\nMultiple security issues were discovered in Pillow, a Python imaging\nlibrary, which could result in denial of service and potentially the\nexecution of arbitrary code if malformed PCX, FLI, SGI or TIFF images\nare processed.\n\nFor the oldstable distribution (stretch), these problems have been fixed\nin version 4.0.0-4+deb9u1.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 5.4.1-2+deb10u1.\n\nWe recommend that you upgrade your pillow packages.\n\nFor the detailed security status of pillow please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/pillow\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 10, "modified": "2020-02-21T20:22:22", "published": "2020-02-21T20:22:22", "id": "DEBIAN:DSA-4631-1:EFD0A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2020/msg00034.html", "title": "[SECURITY] [DSA 4631-1] pillow security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:05:13", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5312", "CVE-2019-19911", "CVE-2020-5313"], "description": "Package : pillow\nVersion : 2.6.1-2+deb8u4\nCVE IDs : CVE-2019-19911 CVE-2020-5312 CVE-2020-5313\nDebian Bug : #948224\n\nIt was discovered that there were three vulnerabilities in Pillow, an\nimaging library for the Python programming language:\n\n * CVE-2019-19911: Prevent a denial-of-service vulnerability caused\n by FpxImagePlugin.py calling the range function on an unvalidated\n 32-bit integer if the number of bands is large.\n\n * CVE-2020-5312: PCX "P mode" buffer overflow.\n\n * CVE-2020-5313: FLI buffer overflow.\n\nFor Debian 8 "Jessie", these issues have been fixed in pillow version\n2.6.1-2+deb8u4.\n\nWe recommend that you upgrade your pillow packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n\nRegards,\n\n- -- \n ,''`.\n : :' : Chris Lamb\n `. `'` lamby@debian.org / chris-lamb.co.uk\n `-\n\n", "edition": 11, "modified": "2020-01-06T16:52:14", "published": "2020-01-06T16:52:14", "id": "DEBIAN:DLA-2057-1:044B0", "href": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00003.html", "title": "[SECURITY] [DLA 2057-1] pillow security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2019-19911", "CVE-2020-5311", "CVE-2020-5312", "CVE-2020-5313"], "description": "Python image processing library, fork of the Python Imaging Library (PIL) This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt ), devel (development) and doc (documentation). ", "modified": "2020-02-22T01:16:45", "published": "2020-02-22T01:16:45", "id": "FEDORA:2B968606CE9E", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 30 Update: python-pillow-5.4.1-4.fc30", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5310", "CVE-2020-5311", "CVE-2020-5312", "CVE-2020-5313"], "description": "Python image processing library, fork of the Python Imaging Library (PIL) This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt ), devel (development) and doc (documentation). ", "modified": "2020-01-31T02:02:49", "published": "2020-01-31T02:02:49", "id": "FEDORA:E732667229A1", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 31 Update: python-pillow-6.2.2-1.fc31", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865"], "description": "Python image processing library, fork of the Python Imaging Library (PIL) This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt ), devel (development) and doc (documentation). ", "modified": "2019-11-30T00:58:05", "published": "2019-11-30T00:58:05", "id": "FEDORA:D4416604E91A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 31 Update: python-pillow-6.1.0-4.fc31", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865"], "description": "Python image processing library, fork of the Python Imaging Library (PIL) This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt ), devel (development) and doc (documentation). ", "modified": "2019-12-05T01:12:52", "published": "2019-12-05T01:12:52", "id": "FEDORA:08FE560A8A1D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 30 Update: python-pillow-5.4.1-3.fc30", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "cve": [{"lastseen": "2020-12-09T21:41:49", "description": "There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.", "edition": 11, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-01-05T22:15:00", "title": "CVE-2019-19911", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19911"], "modified": "2020-08-24T17:37:00", "cpe": [], "id": "CVE-2019-19911", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19911", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": []}, {"lastseen": "2020-12-09T22:03:15", "description": "libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.", "edition": 14, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-03T01:15:00", "title": "CVE-2020-5311", "type": "cve", "cwe": ["CWE-120"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5311"], "modified": "2020-07-10T17:06:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:fedoraproject:fedora:30", "cpe:/o:canonical:ubuntu_linux:19.10", "cpe:/o:fedoraproject:fedora:31", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2020-5311", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5311", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T22:03:15", "description": "libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.", "edition": 9, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-03T01:15:00", "title": "CVE-2020-5310", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5310"], "modified": "2020-01-31T04:15:00", "cpe": [], "id": "CVE-2020-5310", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5310", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2020-12-09T22:03:15", "description": "libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.", "edition": 11, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 4.2}, "published": "2020-01-03T01:15:00", "title": "CVE-2020-5313", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5313"], "modified": "2020-02-18T16:15:00", "cpe": ["cpe:/o:fedoraproject:fedora:31"], "id": "CVE-2020-5313", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5313", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T21:41:46", "description": "An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.", "edition": 16, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-10-04T22:15:00", "title": "CVE-2019-16865", "type": "cve", "cwe": ["CWE-770"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-16865"], "modified": "2020-02-18T16:15:00", "cpe": ["cpe:/o:fedoraproject:fedora:30", "cpe:/o:fedoraproject:fedora:31"], "id": "CVE-2019-16865", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16865", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T22:03:15", "description": "libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.", "edition": 16, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-01-03T01:15:00", "title": "CVE-2020-5312", "type": "cve", "cwe": ["CWE-120"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-5312"], "modified": "2020-07-10T17:09:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:fedoraproject:fedora:30", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:19.10", "cpe:/o:fedoraproject:fedora:31", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2020-5312", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-5312", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"]}], "redhat": [{"lastseen": "2020-07-11T09:55:59", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5311", "CVE-2020-5312"], "description": "The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-02-21T03:06:57", "published": "2020-02-21T02:57:19", "id": "RHSA-2020:0566", "href": "https://access.redhat.com/errata/RHSA-2020:0566", "type": "redhat", "title": "(RHSA-2020:0566) Important: python-pillow security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T09:56:00", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5311", "CVE-2020-5312"], "description": "The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-02-24T17:43:26", "published": "2020-02-24T17:25:31", "id": "RHSA-2020:0580", "href": "https://access.redhat.com/errata/RHSA-2020:0580", "type": "redhat", "title": "(RHSA-2020:0580) Important: python-pillow security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T09:56:39", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-02-24T17:47:47", "published": "2020-02-24T17:10:47", "id": "RHSA-2020:0578", "href": "https://access.redhat.com/errata/RHSA-2020:0578", "type": "redhat", "title": "(RHSA-2020:0578) Important: python-pillow security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T09:56:03", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2019-19355", "CVE-2020-5312"], "description": "Red Hat OpenShift Container Platform is Red Hat's cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* openshift/ocp-release-operator-sdk: /etc/passwd was given incorrect privileges (CVE-2019-19355)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-03-11T10:18:45", "published": "2020-03-11T10:18:07", "id": "RHSA-2020:0683", "href": "https://access.redhat.com/errata/RHSA-2020:0683", "type": "redhat", "title": "(RHSA-2020:0683) Moderate: OpenShift Container Platform 4.3.5 openshift-enterprise-ansible-operator-container security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-07T18:05:05", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5313"], "description": "The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "modified": "2020-09-29T13:41:34", "published": "2020-09-29T11:40:48", "id": "RHSA-2020:3887", "href": "https://access.redhat.com/errata/RHSA-2020:3887", "type": "redhat", "title": "(RHSA-2020:3887) Moderate: python-pillow security update", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2020-07-11T09:57:44", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2019-19346", "CVE-2019-19348", "CVE-2020-1707", "CVE-2020-1708", "CVE-2020-5312"], "description": "Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* openshift/mariadb-apb: /etc/passwd was given incorrect privileges (CVE-2019-19346)\n\n* openshift/apb-base: /etc/passwd was given incorrect privileges (CVE-2019-19348)\n\n* openshift/postgresql-apb: /etc/passwd was given incorrect privileges (CVE-2020-1707)\n\n* openshift/mysql-apb: /etc/passwd was given incorrect privileges (CVE-2020-1708)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-03-11T03:46:38", "published": "2020-03-11T03:44:46", "id": "RHSA-2020:0681", "href": "https://access.redhat.com/errata/RHSA-2020:0681", "type": "redhat", "title": "(RHSA-2020:0681) Moderate: OpenShift Container Platform 4.3.5 security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T09:57:36", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5312"], "description": "The Python Imaging Library (PIL) adds image processing capabilities to your Python interpreter. This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-03-18T20:08:05", "published": "2020-03-18T19:28:49", "id": "RHSA-2020:0898", "href": "https://access.redhat.com/errata/RHSA-2020:0898", "type": "redhat", "title": "(RHSA-2020:0898) Important: python-imaging security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-28T14:03:24", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11538", "CVE-2020-5313"], "description": "The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 (CVE-2020-11538)\n\n* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-07-28T17:26:22", "published": "2020-07-28T17:17:06", "id": "RHSA-2020:3185", "href": "https://access.redhat.com/errata/RHSA-2020:3185", "type": "redhat", "title": "(RHSA-2020:3185) Important: python-pillow security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T09:57:29", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2019-19345", "CVE-2019-19346", "CVE-2019-19348", "CVE-2020-1707", "CVE-2020-1708", "CVE-2020-1709", "CVE-2020-5312", "CVE-2020-8112"], "description": "Red Hat OpenShift Container Platform is Red Hat's cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* openshift/mediawiki-apb: /etc/passwd is given incorrect privileges (CVE-2019-19345)\n\n* openshift/mariadb-apb: /etc/passwd is given incorrect privileges (CVE-2019-19346)\n\n* openshift/apb-base: /etc/passwd is given incorrect privileges (CVE-2019-19348)\n\n* openshift/postgresql-apb: /etc/passwd is given incorrect privileges (CVE-2020-1707)\n\n* openshift/mysql-apb: /etc/passwd is given incorrect privileges (CVE-2020-1708)\n\n* openshift/mediawiki: /etc/passwd is given incorrect privileges (CVE-2020-1709)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-03-13T01:08:30", "published": "2020-03-13T01:04:34", "id": "RHSA-2020:0694", "href": "https://access.redhat.com/errata/RHSA-2020:0694", "type": "redhat", "title": "(RHSA-2020:0694) Moderate: OpenShift Container Platform 4.1.38 security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2020-07-11T11:35:01", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5311"], "description": "[5.1.1-10]\n- Bump and rebuild for gating to deliver CVE fixes\nResolves: rhbz#1789535\n[5.1.1-9]\n- Fix for CVE-2020-5311 - out-of-bounds write in expandrow\nResolves: rhbz#1789535\n[5.1.1-8]\n- Combined fixes for CVE-2020-5312 and CVE-2019-16865\nResolves: rhbz#1789533\nResolves: rhbz#1774066", "edition": 2, "modified": "2020-02-25T00:00:00", "published": "2020-02-25T00:00:00", "id": "ELSA-2020-0580", "href": "http://linux.oracle.com/errata/ELSA-2020-0580.html", "title": "python-pillow security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-07T06:55:20", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312", "CVE-2020-5313"], "description": "[2.0.0-21gitd1c6db8]\n- Fix for CVE-2020-5313\nResolves: rhbz#1789532\n[2.0.0-20gitd1c6db8]\n- Combined fixes for CVE-2020-5312 and CVE-2019-16865\nResolves: rhbz#1789533\nResolves: rhbz#1774066\n[2.0.0-19gitd1c6db8]\n- Reenabled webp support on little endian archs.\n[2.0.0-18gitd1c6db8]\n- Disabled webp support on ppc64le due to #962091 and #1127230.\n- Updated URL.\n[2.0.0-17gitd1c6db8]\n- Wiped out some memory leaks.\n[2.0.0-15.gitd1c6db8]\n- Mass rebuild 2014-01-24\n[2.0.0-14gitd1c6db8]\n- Fixed memory corruption.\n- Resolves: rhbz#1001122\n[2.0.0-13.gitd1c6db8]\n- Mass rebuild 2013-12-27\n[2.0.0-12]\n- Mark doc subpackage arch dependent. Docs are built depending on supported\n features, which are different across archs.\n Resolves: rhbz#987839\n[2.0.0-11]\n- Drop lcms support\n Resolves: rhbz#987839\n[2.0.0-10]\n- Build without webp support on s390* archs\n Resolves: rhbz#962059\n[2.0.0-9.gitd1c6db8]\n- Conditionaly disable build of python3 parts on RHEL system\n[2.0.0-8.gitd1c6db8]\n- Add patch to fix test failure on big-endian\n[2.0.0-7.gitd1c6db8]\n- Remove Obsoletes in the python-pillow-qt subpackage. Obsoletes isnt\n appropriate since qt support didnt exist in the previous python-pillow\n package so theres no reason to drag in python-pillow-qt when updating\n python-pillow.\n[2.0.0-6.gitd1c6db8]\n- Update to latest git\n- python-pillow_quantization.patch now upstream\n- python-pillow_endianness.patch now upstream\n- Add subpackage for ImageQt module, with correct dependencies\n- Add PyQt4 and numpy BR (for generating docs / running tests)\n[2.0.0-5.git93a488e]\n- Reenable tests on bigendian, add patches for #928927\n[2.0.0-4.git93a488e]\n- Update to latest git\n- disable tests on bigendian (PPC*, S390*) until rhbz#928927 is fixed\n[2.0.0-3.gitde210a2]\n- python-pillow_tempfile.patch now upstream\n- Add python3-imaging provides (bug #924867)\n[2.0.0-2.git2e88848]\n- Update to latest git\n- Remove python-pillow-disable-test.patch, gcc is now fixed\n- Add python-pillow_tempfile.patch to prevent a temporary file from getting packaged\n[2.0.0-1.git2f4207c]\n- Update to 2.0.0 git snapshot\n- Enable python3 packages\n- Add libwebp-devel BR for Pillow 2.0.0\n[1.7.8-6.20130305git]\n- Add ARM support\n[1.7.8-5.20130305git]\n- add s390* and ppc* to arch detection\n[1.7.8-4.20130305git7866759]\n- Update to latest git snapshot\n- 0001-Cast-hash-table-values-to-unsigned-long.patch now upstream\n- Pillow-1.7.8-selftest.patch now upstream\n[1.7.8-3.20130210gite09ff61]\n- Really remove -fno-strict-aliasing\n- Place comment on how to retreive source just above the Source0 line\n[1.7.8-2.20130210gite09ff61]\n- Rebuild without -fno-strict-aliasing\n- Add patch for upstream issue #52\n[1.7.8-1.20130210gite09ff61]\n- Initial RPM package", "edition": 1, "modified": "2020-10-06T00:00:00", "published": "2020-10-06T00:00:00", "id": "ELSA-2020-3887", "href": "http://linux.oracle.com/errata/ELSA-2020-3887.html", "title": "python-pillow security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T11:32:03", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "[1.1.6-20]\n- Fixes for CVE-2020-5312 and related part of CVE-2019-16865\nResolves: rhbz#1789533", "edition": 2, "modified": "2020-03-19T00:00:00", "published": "2020-03-19T00:00:00", "id": "ELSA-2020-0898", "href": "http://linux.oracle.com/errata/ELSA-2020-0898.html", "title": "python-imaging security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-11T11:26:57", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "[2.0.0-20gitd1c6db8]\n- Combined fixes for CVE-2020-5312 and CVE-2019-16865\nResolves: rhbz#1789533\nResolves: rhbz#1774066\n[2.0.0-19gitd1c6db8]\n- Reenabled webp support on little endian archs.\n[2.0.0-18gitd1c6db8]\n- Disabled webp support on ppc64le due to #962091 and #1127230.\n- Updated URL.\n[2.0.0-17gitd1c6db8]\n- Wiped out some memory leaks.\n[2.0.0-15.gitd1c6db8]\n- Mass rebuild 2014-01-24\n[2.0.0-14gitd1c6db8]\n- Fixed memory corruption.\n- Resolves: rhbz#1001122\n[2.0.0-13.gitd1c6db8]\n- Mass rebuild 2013-12-27\n[2.0.0-12]\n- Mark doc subpackage arch dependent. Docs are built depending on supported\n features, which are different across archs.\n Resolves: rhbz#987839\n[2.0.0-11]\n- Drop lcms support\n Resolves: rhbz#987839\n[2.0.0-10]\n- Build without webp support on s390* archs\n Resolves: rhbz#962059\n[2.0.0-9.gitd1c6db8]\n- Conditionaly disable build of python3 parts on RHEL system\n[2.0.0-8.gitd1c6db8]\n- Add patch to fix test failure on big-endian\n[2.0.0-7.gitd1c6db8]\n- Remove Obsoletes in the python-pillow-qt subpackage. Obsoletes isn't\n appropriate since qt support didn't exist in the previous python-pillow\n package so there's no reason to drag in python-pillow-qt when updating\n python-pillow.\n[2.0.0-6.gitd1c6db8]\n- Update to latest git\n- python-pillow_quantization.patch now upstream\n- python-pillow_endianness.patch now upstream\n- Add subpackage for ImageQt module, with correct dependencies\n- Add PyQt4 and numpy BR (for generating docs / running tests)\n[2.0.0-5.git93a488e]\n- Reenable tests on bigendian, add patches for #928927\n[2.0.0-4.git93a488e]\n- Update to latest git\n- disable tests on bigendian (PPC*, S390*) until rhbz#928927 is fixed\n[2.0.0-3.gitde210a2]\n- python-pillow_tempfile.patch now upstream\n- Add python3-imaging provides (bug #924867)\n[2.0.0-2.git2e88848]\n- Update to latest git\n- Remove python-pillow-disable-test.patch, gcc is now fixed\n- Add python-pillow_tempfile.patch to prevent a temporary file from getting packaged\n[2.0.0-1.git2f4207c]\n- Update to 2.0.0 git snapshot\n- Enable python3 packages\n- Add libwebp-devel BR for Pillow 2.0.0\n[1.7.8-6.20130305git]\n- Add ARM support\n[1.7.8-5.20130305git]\n- add s390* and ppc* to arch detection\n[1.7.8-4.20130305git7866759]\n- Update to latest git snapshot\n- 0001-Cast-hash-table-values-to-unsigned-long.patch now upstream\n- Pillow-1.7.8-selftest.patch now upstream\n[1.7.8-3.20130210gite09ff61]\n- Really remove -fno-strict-aliasing\n- Place comment on how to retreive source just above the Source0 line\n[1.7.8-2.20130210gite09ff61]\n- Rebuild without -fno-strict-aliasing\n- Add patch for upstream issue #52\n[1.7.8-1.20130210gite09ff61]\n- Initial RPM package", "edition": 3, "modified": "2020-02-25T00:00:00", "published": "2020-02-25T00:00:00", "id": "ELSA-2020-0578", "href": "http://linux.oracle.com/errata/ELSA-2020-0578.html", "title": "python-pillow security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-29T23:36:16", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11538", "CVE-2020-5313"], "description": "[5.1.1-12]\n- Fix for CVE-2020-5313\nResolves: rhbz#1789532\n[5.1.1-11]\n- Fix for CVE-2020-11538\nResolves: rhbz#1852814", "edition": 1, "modified": "2020-07-29T00:00:00", "published": "2020-07-29T00:00:00", "id": "ELSA-2020-3185", "href": "http://linux.oracle.com/errata/ELSA-2020-3185.html", "title": "python-pillow security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2020-07-11T11:29:43", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "**CentOS Errata and Security Advisory** CESA-2020:0578\n\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2020-February/035646.html\n\n**Affected packages:**\npython-pillow\npython-pillow-devel\npython-pillow-doc\npython-pillow-qt\npython-pillow-sane\npython-pillow-tk\n\n**Upstream details at:**\n", "edition": 2, "modified": "2020-02-26T17:13:51", "published": "2020-02-26T17:13:51", "id": "CESA-2020:0578", "href": "http://lists.centos.org/pipermail/centos-announce/2020-February/035646.html", "title": "python security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-20T23:06:01", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5313"], "description": "**CentOS Errata and Security Advisory** CESA-2020:3887\n\n\nThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2020-October/012813.html\n\n**Affected packages:**\npython-pillow\npython-pillow-devel\npython-pillow-doc\npython-pillow-qt\npython-pillow-sane\npython-pillow-tk\n\n**Upstream details at:**\n", "edition": 1, "modified": "2020-10-20T18:49:16", "published": "2020-10-20T18:49:16", "id": "CESA-2020:3887", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2020-October/012813.html", "title": "python security update", "type": "centos", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2020-07-11T11:27:58", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5312"], "description": "**CentOS Errata and Security Advisory** CESA-2020:0898\n\n\nThe Python Imaging Library (PIL) adds image processing capabilities to your Python interpreter. This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities.\n\nSecurity Fix(es):\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2020-March/035690.html\n\n**Affected packages:**\npython-imaging\npython-imaging-devel\npython-imaging-sane\npython-imaging-tk\n\n**Upstream details at:**\n", "edition": 2, "modified": "2020-03-25T19:22:40", "published": "2020-03-25T19:22:40", "id": "CESA-2020:0898", "href": "http://lists.centos.org/pipermail/centos-announce/2020-March/035690.html", "title": "python security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:35:56", "bulletinFamily": "unix", "cvelist": ["CVE-2019-16865", "CVE-2020-5312"], "description": "**Issue Overview:**\n\nA flaw was discovered in the way the python-pillow may allocate a large amount of memory or require a long time while processing specially crafted image files, possibly causing a denial of service. Applications that use the library to process untrusted files may be vulnerable to this flaw. ([CVE-2019-16865 __](<https://access.redhat.com/security/cve/CVE-2019-16865>))\n\nA flaw was discovered in python-pillow where it does not properly restrict operations within the bounds of a memory buffer when decoding PCX images. An application that uses python-pillow to decode untrusted images may be vulnerable to this flaw, which can allow an attacker to crash the application or potentially execute code on the system. ([CVE-2020-5312 __](<https://access.redhat.com/security/cve/CVE-2020-5312>))\n\n \n**Affected Packages:** \n\n\npython-pillow\n\n \n**Issue Correction:** \nRun _yum update python-pillow_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n python-pillow-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-devel-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-doc-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-sane-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-tk-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-debuginfo-2.0.0-20.gitd1c6db8.amzn2.0.1.aarch64 \n \n i686: \n python-pillow-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-devel-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-doc-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-sane-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-tk-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-debuginfo-2.0.0-20.gitd1c6db8.amzn2.0.1.i686 \n \n src: \n python-pillow-2.0.0-20.gitd1c6db8.amzn2.0.1.src \n \n x86_64: \n python-pillow-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-devel-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-doc-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-sane-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-tk-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-debuginfo-2.0.0-20.gitd1c6db8.amzn2.0.1.x86_64 \n \n \n", "edition": 1, "modified": "2020-04-20T20:47:00", "published": "2020-04-20T20:47:00", "id": "ALAS2-2020-1412", "href": "https://alas.aws.amazon.com/AL2/ALAS-2020-1412.html", "title": "Important: python-pillow", "type": "amazon", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-10T12:37:15", "bulletinFamily": "unix", "cvelist": ["CVE-2020-5313"], "description": "**Issue Overview:**\n\nAn out-of-bounds read was discovered in python-pillow in the way it decodes FLI images. An application that uses python-pillow to load untrusted images may be vulnerable to this flaw, which can allow an attacker to read the memory of the application they should be not allowed to read. ([CVE-2020-5313 __](<https://access.redhat.com/security/cve/CVE-2020-5313>))\n\n \n**Affected Packages:** \n\n\npython-pillow\n\n \n**Issue Correction:** \nRun _yum update python-pillow_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n python-pillow-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-devel-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-doc-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-sane-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-tk-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n python-pillow-debuginfo-2.0.0-21.gitd1c6db8.amzn2.0.1.aarch64 \n \n i686: \n python-pillow-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-devel-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-doc-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-sane-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-tk-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n python-pillow-debuginfo-2.0.0-21.gitd1c6db8.amzn2.0.1.i686 \n \n src: \n python-pillow-2.0.0-21.gitd1c6db8.amzn2.0.1.src \n \n x86_64: \n python-pillow-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-devel-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-doc-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-sane-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-tk-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n python-pillow-debuginfo-2.0.0-21.gitd1c6db8.amzn2.0.1.x86_64 \n \n \n", "edition": 1, "modified": "2020-10-22T18:36:00", "published": "2020-10-22T18:36:00", "id": "ALAS2-2020-1542", "href": "https://alas.aws.amazon.com/AL2/ALAS-2020-1542.html", "title": "Medium: python-pillow", "type": "amazon", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "github": [{"lastseen": "2020-12-24T13:32:44", "bulletinFamily": "software", "cvelist": ["CVE-2019-19911"], "description": "There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.", "edition": 3, "modified": "2020-04-01T16:36:44", "published": "2020-04-01T16:36:44", "id": "GHSA-5GM3-PX64-RW72", "href": "https://github.com/advisories/GHSA-5gm3-px64-rw72", "title": "Uncontrolled Resource Consumption in Pillow", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-24T13:32:44", "bulletinFamily": "software", "cvelist": ["CVE-2020-5313"], "description": "libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.", "edition": 3, "modified": "2020-04-01T16:36:00", "published": "2020-04-01T16:36:00", "id": "GHSA-HJ69-C76V-86WR", "href": "https://github.com/advisories/GHSA-hj69-c76v-86wr", "title": "Out-of-bounds Read in Pillow", "type": "github", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2020-04-06T23:39:19", "bulletinFamily": "software", "cvelist": ["CVE-2019-16865"], "description": "An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.", "edition": 5, "modified": "2019-12-03T18:35:45", "published": "2019-10-22T14:40:42", "id": "GHSA-J7MJ-748X-7P78", "href": "https://github.com/advisories/GHSA-j7mj-748x-7p78", "title": "DOS attack in Pillow when processing specially crafted image files", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}