Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160222132533.7c9cf4f7@redhat.com>
Date: Mon, 22 Feb 2016 13:25:33 +0100
From: Stefan Cornelius <scorneli@...hat.com>
To: Eric Soroos <eric@...oos.net>
Cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE Request -- Buffer overflow in Python-Pillow
 and PIL

On Tue, 2 Feb 2016 18:51:24 +0000
Eric Soroos <eric@...oos.net> wrote:

> Hello, 
> 
> I’d like to request a CVE number for all versions of Python Pillow <=
> 3.1.0  and PIL == 1.1.7 (at the least). 
> 
> There is a buffer overflow in PcdDecode.c, where the decoder writes
> assuming 4 bytes per pixel into a 3 byte per pixel wide buffer,
> allowing writing 768 bytes off the end of the buffer. This overwrites
> objects in Python's stack, leading to a crash. 
> 
> This issue and the patch are public:
> https://github.com/python-pillow/Pillow/pull/1706
> 
> Thanks, 
> 
> Eric

Hi,

I don't think this ever got a CVE? Could one please be assigned?

Thanks and kind regards,
-- 
Stefan Cornelius / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.