-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0191
                    USN-5227-1: Pillow vulnerabilities
                              14 January 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Pillow
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-22817 CVE-2022-22816 CVE-2022-22815
                   CVE-2021-34552 CVE-2021-23437 

Reference:         ESB-2021.2665
                   ESB-2021.2620

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-5227-1

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-5227-1: Pillow vulnerabilities
13 January 2022

Several security issues were fixed in Pillow.
Releases

  o Ubuntu 21.10
  o Ubuntu 21.04
  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 LTS

Packages

  o pillow - Python Imaging Library

Details

It was discovered that Pillow incorrectly handled certain image files. If a
user or automated system were tricked into opening a specially-crafted
file, a remote attacker could cause Pillow to hang, resulting in a denial
of service. ( CVE-2021-23437 )

It was discovered that Pillow incorrectly handled certain image files. If a
user or automated system were tricked into opening a specially-crafted
file, a remote attacker could cause Pillow to crash, resulting in a denial
of service. This issue ony affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 21.04. ( CVE-2021-34552 )

It was discovered that Pillow incorrectly handled certain image files. If a
user or automated system were tricked into opening a specially-crafted
file, a remote attacker could cause Pillow to crash, resulting in a denial
of service, or possibly execute arbitrary code. ( CVE-2022-22815 )

It was discovered that Pillow incorrectly handled certain image files. If a
user or automated system were tricked into opening a specially-crafted
file, a remote attacker could cause Pillow to crash, resulting in a denial
of service. ( CVE-2022-22816 )

It was discovered that Pillow incorrectly handled certain image files. If a
user or automated system were tricked into opening a specially-crafted
file, a remote attacker could cause Pillow to crash, resulting in a denial
of service, or possibly execute arbitrary code. ( CVE-2022-22817 )

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.10

  o python3-pil - 8.1.2+dfsg-0.3ubuntu0.1

Ubuntu 21.04

  o python3-pil - 8.1.2-1ubuntu0.2

Ubuntu 20.04

  o python3-pil - 7.0.0-4ubuntu0.5

Ubuntu 18.04

  o python3-pil - 5.1.0-1ubuntu0.7
  o python-pil - 5.1.0-1ubuntu0.7

In general, a standard system update will make all the necessary changes.

References

  o CVE-2022-22817
  o CVE-2022-22816
  o CVE-2021-34552
  o CVE-2021-23437
  o CVE-2022-22815

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYeEDZeNLKJtyKPYoAQi3EQ//aWf2uOfk/8dgNyxKnviLYgmmRcgCpqzc
2vafyWMi5dK5PmI9y5zL1L2RhngBCnAKRGZmqpDs/PiH8/GWQBeOcKV3IK/XvNdQ
gN4vwaz79fdPvSSaRYbhpImJdbxxk92etGMyaBuWsmTLGoP0GBHov3qYF3cNP24F
kp9yRlXAfKRX3qg4pSzLiW4BysZ10/QoAqnTQu3TEY8lE2fj3rlzJewvh2U9m3Cj
HPLBTu/8p+JP7NjwY5Z9IHevi01SRy36Kp/4APhXwGa76zgUH9mmK0tUj8EEcmpz
bV5+n+U6lhRPia92ge9xn2e64pdOVxqvQeB2EeVwZZmBG8UIeUSdDqLwA9cSzEOD
TblzVHoiHXK7dRNOLqCi1fuzObDtvLcnJptFi6qJIrxRFMqfYk9u3JC5ypwsj/oL
VN7MSvttR4LzvNhu7mQymjPna1u20zI+YJiW8gtOFSyrYaDdvtJxpmBTkJQ/2MGQ
8DStxAD9behl7SVa1UnBFbJwJLVtbqVSpEYxz9YAk0V7ZS0tpeTZoiplTb/QOb+r
8YYaDLZEeMcp5Eb6Otc4KFKAfpaRXOKNn6Qa/3B+3XN7O2QbutR9y5VFCdbb0oJs
WlG4DMYwUy8ZLG5B9wtyGva6irUsvc7Phyye4Zvnst8jnypPepbIwfdhV+QjThMP
I5/w40yhl3o=
=NxHf
-----END PGP SIGNATURE-----