From https://bugzilla.redhat.com/show_bug.cgi?id=1382006: It was found that in storage.c, the image size is not checked for negative values. This can lead to a null pointer dereference in 3.3.x, or a dereference of junk memory prior to that. Upstream patch: https://github.com/python-pillow/Pillow/commit/5d8a0be45aad78c5a22c8d099118ee26ef8144af From https://bugzilla.redhat.com/show_bug.cgi?id=1382000: Integer overflow vulnerabilities were found in PyImaging_MapBuffer function, specifically there's unchecked multiplication of xsize * ysize * bytes_per_pixel where the sizes are each an int as well as unchecked addition of the size calculated above with a attacker provided offset value. Upstream patch: https://github.com/python-pillow/Pillow/commit/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
commit 7f1928645dd45316d4d70e14e34b7859cbb1fe18 Author: Lars Wendler <polynomial-c@gentoo.org> Date: Mon Oct 24 12:20:31 2016 dev-python/pillow: Bump to version 3.4.2 Package-Manager: portage-2.3.2 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>
@maintainer(s), do you want to stabilize?
The two vulnerabilities were already reported in bug 599608 and bug 599610 so closing as duplicate. *** This bug has been marked as a duplicate of bug 599610 ***