USN-3230-1: Pillow vulnerabilities

Ubuntu Security Notice USN-3230-1

13th March, 2017

pillow vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Pillow.

Software description

  • pillow
    – Python Imaging Library

Details

It was discovered that Pillow incorrectly handled certain compressed text
chunks in PNG images. A remote attacker could possibly use this issue to
cause Pillow to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2014-9601)

Cris Neckar discovered that Pillow incorrectly handled certain malformed
images. A remote attacker could use this issue to cause Pillow to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2016-9189)

Cris Neckar discovered that Pillow incorrectly handled certain malformed
images. A remote attacker could use this issue to cause Pillow to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-9190)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
python-imaging

3.3.1-1ubuntu0.1
python3-pil

3.3.1-1ubuntu0.1
python-pil

3.3.1-1ubuntu0.1
Ubuntu 16.04 LTS:
python-imaging

3.1.2-0ubuntu1.1
python3-pil

3.1.2-0ubuntu1.1
python-pil

3.1.2-0ubuntu1.1
Ubuntu 14.04 LTS:
python-imaging

2.3.0-1ubuntu3.4
python3-pil

2.3.0-1ubuntu3.4
python-pil

2.3.0-1ubuntu3.4
python3-imaging

2.3.0-1ubuntu3.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-9601,

CVE-2016-9189,

CVE-2016-9190


Source From: ubuntu.com.
Original article title: USN-3230-1: Pillow vulnerabilities.
This full article can be read at: USN-3230-1: Pillow vulnerabilities.

Advertisement


Random Article You May Like

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*