-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integer Overflow in ImagingResampleHorizontal #1710
Comments
Sounds to me like you have a fairly good handle on the situation. Would you be interested in creating a PR to solve the problem? |
Sure, I'll take a look. |
Oh, I just noticed in #1708 there's a mention of a private repo for security updates and some CVEs. I hope you don't mind that I disclosed this bug here. If I find related bugs in the future, should I contact the maintainers through some other channel? |
The current conclusion of #1658 is to e-mail aclark@aclark.net and let him know. |
Ok, in the future I'll contact him there. I've contributed security fixes to some projects before but hadn't encountered a security procedure like this. (For example, the CPython project itself just accepts public disclosures in their normal bug tracker.) |
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco MFH: 2016Q1 Security: a8de962a-cf15-11e5-805c-5453ed2e2b49 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@408782 35697150-7ecd-e111-bb59-0022644237b5
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco MFH: 2016Q1 Security: a8de962a-cf15-11e5-805c-5453ed2e2b49
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco Security: a8de962a-cf15-11e5-805c-5453ed2e2b49 Approved by: ports-secteam (security)
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco MFH: 2016Q1 Security: a8de962a-cf15-11e5-805c-5453ed2e2b49 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@408782 35697150-7ecd-e111-bb59-0022644237b5
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco Security: a8de962a-cf15-11e5-805c-5453ed2e2b49 Approved by: ports-secteam (security)
Backport security fixes from 3.1.1 release, resolving the following vulnerabilities: * CVE-2016-0775: Buffer overflow in FLI decoding code * CVE-2016-0740: Buffer overflow in TIFF decoding code * Integer overflow in Resample.c [1] * Buffer overflow in PCD decoder [2] [1] python-pillow/Pillow#1710 [2] python-pillow/Pillow#568 PR: 207053 Submitted by: rakuco Security: a8de962a-cf15-11e5-805c-5453ed2e2b49 Approved by: ports-secteam (security)
ImagingResampleHorizontal
mallocs two buffers:xsize
is trusted user input. These multiplications can overflow, leading the malloc'd buffer to be undersized. These allocations are followed by a loop that writes out of bounds. This can lead to corruption on the heap of the Python process with attacker controlled data (exploiting this would be really cool, as the loop contains some serious floaty arithmetic). It's possible someone has an image resizing service using Pillow. :)See the following proof of concept:
where "cat.jpg" is your favorite valid cat picture.
The text was updated successfully, but these errors were encountered: