{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for python-Pillow","title":"Title of the patch"},{"category":"description","text":"This update for python-Pillow fixes the following issues:\n\n- Fixed ImagePath.Path array handling (bsc#1194552, CVE-2022-22815, bsc#1194551, CVE-2022-22816)\n- Use snprintf instead of sprintf (bsc#1188574, CVE-2021-34552)\n- Fix Memory DOS in Icns, Ico and Blp Image Plugins. (bsc#1183110, CVE-2021-27921, bsc#1183108, CVE-2021-27922, bsc#1183107, CVE-2021-27923)\n- Fix OOB read in SgiRleDecode.c (bsc#1183102, CVE-2021-25293)\n- Use more specific regex chars to prevent ReDoS (bsc#1183101, CVE-2021-25292)\n- Fix negative size read in TiffDecode.c (bsc#1183105, CVE-2021-25290)\n- Raise ValueError if color specifier is too long (bsc#1190229, CVE-2021-23437)\n- Incorrect error code checking in TiffDecode.c (bsc#1183103, CVE-2021-25289)\n- OOB Write in TiffDecode.c (bsc#1180833, CVE-2020-35654)\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2024-1673,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1673","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1673-2.json"},{"category":"self","summary":"URL for SUSE-SU-2024:1673-2","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241673-2/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2024:1673-2","url":"https://lists.suse.com/pipermail/sle-security-updates/2024-June/018714.html"},{"category":"self","summary":"SUSE Bug 1180833","url":"https://bugzilla.suse.com/1180833"},{"category":"self","summary":"SUSE Bug 1183101","url":"https://bugzilla.suse.com/1183101"},{"category":"self","summary":"SUSE Bug 1183102","url":"https://bugzilla.suse.com/1183102"},{"category":"self","summary":"SUSE Bug 1183103","url":"https://bugzilla.suse.com/1183103"},{"category":"self","summary":"SUSE Bug 1183105","url":"https://bugzilla.suse.com/1183105"},{"category":"self","summary":"SUSE Bug 1183107","url":"https://bugzilla.suse.com/1183107"},{"category":"self","summary":"SUSE Bug 1183108","url":"https://bugzilla.suse.com/1183108"},{"category":"self","summary":"SUSE Bug 1183110","url":"https://bugzilla.suse.com/1183110"},{"category":"self","summary":"SUSE Bug 1188574","url":"https://bugzilla.suse.com/1188574"},{"category":"self","summary":"SUSE Bug 1190229","url":"https://bugzilla.suse.com/1190229"},{"category":"self","summary":"SUSE Bug 1194551","url":"https://bugzilla.suse.com/1194551"},{"category":"self","summary":"SUSE Bug 1194552","url":"https://bugzilla.suse.com/1194552"},{"category":"self","summary":"SUSE CVE CVE-2020-35654 page","url":"https://www.suse.com/security/cve/CVE-2020-35654/"},{"category":"self","summary":"SUSE CVE CVE-2021-23437 page","url":"https://www.suse.com/security/cve/CVE-2021-23437/"},{"category":"self","summary":"SUSE CVE CVE-2021-25289 page","url":"https://www.suse.com/security/cve/CVE-2021-25289/"},{"category":"self","summary":"SUSE CVE CVE-2021-25290 page","url":"https://www.suse.com/security/cve/CVE-2021-25290/"},{"category":"self","summary":"SUSE CVE CVE-2021-25292 page","url":"https://www.suse.com/security/cve/CVE-2021-25292/"},{"category":"self","summary":"SUSE CVE CVE-2021-25293 page","url":"https://www.suse.com/security/cve/CVE-2021-25293/"},{"category":"self","summary":"SUSE CVE CVE-2021-27921 page","url":"https://www.suse.com/security/cve/CVE-2021-27921/"},{"category":"self","summary":"SUSE CVE CVE-2021-27922 page","url":"https://www.suse.com/security/cve/CVE-2021-27922/"},{"category":"self","summary":"SUSE CVE CVE-2021-27923 page","url":"https://www.suse.com/security/cve/CVE-2021-27923/"},{"category":"self","summary":"SUSE CVE CVE-2021-34552 page","url":"https://www.suse.com/security/cve/CVE-2021-34552/"},{"category":"self","summary":"SUSE CVE CVE-2022-22815 page","url":"https://www.suse.com/security/cve/CVE-2022-22815/"},{"category":"self","summary":"SUSE CVE CVE-2022-22816 page","url":"https://www.suse.com/security/cve/CVE-2022-22816/"}],"title":"Security update for python-Pillow","tracking":{"current_release_date":"2024-06-13T09:22:50Z","generator":{"date":"2024-06-13T09:22:50Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2024:1673-2","initial_release_date":"2024-06-13T09:22:50Z","revision_history":[{"date":"2024-06-13T09:22:50Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"python3-Pillow-7.2.0-150300.3.15.1.aarch64","product":{"name":"python3-Pillow-7.2.0-150300.3.15.1.aarch64","product_id":"python3-Pillow-7.2.0-150300.3.15.1.aarch64"}},{"category":"product_version","name":"python3-Pillow-tk-7.2.0-150300.3.15.1.aarch64","product":{"name":"python3-Pillow-tk-7.2.0-150300.3.15.1.aarch64","product_id":"python3-Pillow-tk-7.2.0-150300.3.15.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"python3-Pillow-7.2.0-150300.3.15.1.i586","product":{"name":"python3-Pillow-7.2.0-150300.3.15.1.i586","product_id":"python3-Pillow-7.2.0-150300.3.15.1.i586"}},{"category":"product_version","name":"python3-Pillow-tk-7.2.0-150300.3.15.1.i586","product":{"name":"python3-Pillow-tk-7.2.0-150300.3.15.1.i586","product_id":"python3-Pillow-tk-7.2.0-150300.3.15.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"python3-Pillow-7.2.0-150300.3.15.1.ppc64le","product":{"name":"python3-Pillow-7.2.0-150300.3.15.1.ppc64le","product_id":"python3-Pillow-7.2.0-150300.3.15.1.ppc64le"}},{"category":"product_version","name":"python3-Pillow-tk-7.2.0-150300.3.15.1.ppc64le","product":{"name":"python3-Pillow-tk-7.2.0-150300.3.15.1.ppc64le","product_id":"python3-Pillow-tk-7.2.0-150300.3.15.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"python3-Pillow-7.2.0-150300.3.15.1.s390x","product":{"name":"python3-Pillow-7.2.0-150300.3.15.1.s390x","product_id":"python3-Pillow-7.2.0-150300.3.15.1.s390x"}},{"category":"product_version","name":"python3-Pillow-tk-7.2.0-150300.3.15.1.s390x","product":{"name":"python3-Pillow-tk-7.2.0-150300.3.15.1.s390x","product_id":"python3-Pillow-tk-7.2.0-150300.3.15.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"python3-Pillow-7.2.0-150300.3.15.1.x86_64","product":{"name":"python3-Pillow-7.2.0-150300.3.15.1.x86_64","product_id":"python3-Pillow-7.2.0-150300.3.15.1.x86_64"}},{"category":"product_version","name":"python3-Pillow-tk-7.2.0-150300.3.15.1.x86_64","product":{"name":"python3-Pillow-tk-7.2.0-150300.3.15.1.x86_64","product_id":"python3-Pillow-tk-7.2.0-150300.3.15.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Module for Package Hub 15 SP6","product":{"name":"SUSE Linux Enterprise Module for Package Hub 15 SP6","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP6","product_identification_helper":{"cpe":"cpe:/o:suse:packagehub:15:sp6"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python3-Pillow-7.2.0-150300.3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64"},"product_reference":"python3-Pillow-7.2.0-150300.3.15.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"python3-Pillow-7.2.0-150300.3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP6","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le"},"product_reference":"python3-Pillow-7.2.0-150300.3.15.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"python3-Pillow-7.2.0-150300.3.15.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP6","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x"},"product_reference":"python3-Pillow-7.2.0-150300.3.15.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP6"},{"category":"default_component_of","full_product_name":{"name":"python3-Pillow-7.2.0-150300.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"},"product_reference":"python3-Pillow-7.2.0-150300.3.15.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP6"}]},"vulnerabilities":[{"cve":"CVE-2020-35654","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-35654"}],"notes":[{"category":"general","text":"In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-35654","url":"https://www.suse.com/security/cve/CVE-2020-35654"},{"category":"external","summary":"SUSE Bug 1180833 for CVE-2020-35654","url":"https://bugzilla.suse.com/1180833"},{"category":"external","summary":"SUSE Bug 1183103 for CVE-2020-35654","url":"https://bugzilla.suse.com/1183103"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2020-35654"},{"cve":"CVE-2021-23437","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-23437"}],"notes":[{"category":"general","text":"The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-23437","url":"https://www.suse.com/security/cve/CVE-2021-23437"},{"category":"external","summary":"SUSE Bug 1190229 for CVE-2021-23437","url":"https://bugzilla.suse.com/1190229"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-23437"},{"cve":"CVE-2021-25289","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-25289"}],"notes":[{"category":"general","text":"An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-25289","url":"https://www.suse.com/security/cve/CVE-2021-25289"},{"category":"external","summary":"SUSE Bug 1183103 for CVE-2021-25289","url":"https://bugzilla.suse.com/1183103"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"critical"}],"title":"CVE-2021-25289"},{"cve":"CVE-2021-25290","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-25290"}],"notes":[{"category":"general","text":"An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-25290","url":"https://www.suse.com/security/cve/CVE-2021-25290"},{"category":"external","summary":"SUSE Bug 1183105 for CVE-2021-25290","url":"https://bugzilla.suse.com/1183105"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-25290"},{"cve":"CVE-2021-25292","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-25292"}],"notes":[{"category":"general","text":"An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-25292","url":"https://www.suse.com/security/cve/CVE-2021-25292"},{"category":"external","summary":"SUSE Bug 1183101 for CVE-2021-25292","url":"https://bugzilla.suse.com/1183101"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-25292"},{"cve":"CVE-2021-25293","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-25293"}],"notes":[{"category":"general","text":"An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-25293","url":"https://www.suse.com/security/cve/CVE-2021-25293"},{"category":"external","summary":"SUSE Bug 1183102 for CVE-2021-25293","url":"https://bugzilla.suse.com/1183102"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-25293"},{"cve":"CVE-2021-27921","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-27921"}],"notes":[{"category":"general","text":"Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-27921","url":"https://www.suse.com/security/cve/CVE-2021-27921"},{"category":"external","summary":"SUSE Bug 1183110 for CVE-2021-27921","url":"https://bugzilla.suse.com/1183110"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-27921"},{"cve":"CVE-2021-27922","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-27922"}],"notes":[{"category":"general","text":"Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-27922","url":"https://www.suse.com/security/cve/CVE-2021-27922"},{"category":"external","summary":"SUSE Bug 1183108 for CVE-2021-27922","url":"https://bugzilla.suse.com/1183108"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-27922"},{"cve":"CVE-2021-27923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-27923"}],"notes":[{"category":"general","text":"Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-27923","url":"https://www.suse.com/security/cve/CVE-2021-27923"},{"category":"external","summary":"SUSE Bug 1183107 for CVE-2021-27923","url":"https://bugzilla.suse.com/1183107"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-27923"},{"cve":"CVE-2021-34552","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-34552"}],"notes":[{"category":"general","text":"Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-34552","url":"https://www.suse.com/security/cve/CVE-2021-34552"},{"category":"external","summary":"SUSE Bug 1188574 for CVE-2021-34552","url":"https://bugzilla.suse.com/1188574"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"important"}],"title":"CVE-2021-34552"},{"cve":"CVE-2022-22815","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-22815"}],"notes":[{"category":"general","text":"path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-22815","url":"https://www.suse.com/security/cve/CVE-2022-22815"},{"category":"external","summary":"SUSE Bug 1194552 for CVE-2022-22815","url":"https://bugzilla.suse.com/1194552"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"low"}],"title":"CVE-2022-22815"},{"cve":"CVE-2022-22816","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-22816"}],"notes":[{"category":"general","text":"path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-22816","url":"https://www.suse.com/security/cve/CVE-2022-22816"},{"category":"external","summary":"SUSE Bug 1194551 for CVE-2022-22816","url":"https://bugzilla.suse.com/1194551"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.aarch64","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.ppc64le","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.s390x","SUSE Linux Enterprise Module for Package Hub 15 SP6:python3-Pillow-7.2.0-150300.3.15.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-13T09:22:50Z","details":"low"}],"title":"CVE-2022-22816"}]}