Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 596356 - <dev-python/pillow-3.4.2: two vulnerabilities
Summary: <dev-python/pillow-3.4.2: two vulnerabilities
Status: RESOLVED DUPLICATE of bug 599610
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Depends on: CVE-2016-9190
  Show dependency tree
Reported: 2016-10-06 15:50 UTC by Agostino Sarubbo
Modified: 2016-11-29 01:09 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-10-06 15:50:04 UTC

It was found that in storage.c, the image size is not checked for negative values. This can lead to a null pointer dereference in 3.3.x, or a dereference 
of junk memory prior to that.

Upstream patch:


Integer overflow vulnerabilities were found in PyImaging_MapBuffer function, specifically there's unchecked multiplication of xsize * ysize * 
bytes_per_pixel where the sizes are each an int as well as unchecked addition of the size calculated above with a attacker provided offset value.

Upstream patch:

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Lars Wendler (Polynomial-C) gentoo-dev 2016-10-24 11:31:17 UTC
commit 7f1928645dd45316d4d70e14e34b7859cbb1fe18
Author: Lars Wendler <>
Date:   Mon Oct 24 12:20:31 2016

    dev-python/pillow: Bump to version 3.4.2

    Package-Manager: portage-2.3.2
    Signed-off-by: Lars Wendler <>
Comment 2 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2016-11-11 07:14:01 UTC
@maintainer(s), do you want to stabilize?
Comment 3 Thomas Deutschmann gentoo-dev Security 2016-11-29 01:09:07 UTC
The two vulnerabilities were already reported in bug 599608 and bug 599610 so closing as duplicate.

*** This bug has been marked as a duplicate of bug 599610 ***