[CVE-2022-22815] path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path. URLs: https://nvd.nist.gov/vuln/detail/CVE-2022-22815 https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331 [CVE-2022-22816] path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. URLs: https://nvd.nist.gov/vuln/detail/CVE-2022-22816 https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331 [CVE-2022-22817] PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. URLs: https://nvd.nist.gov/vuln/detail/CVE-2022-22817 https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval Reproducible: Always
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7c1bb06397f328afec57551a3365ad36d91ded2d commit 7c1bb06397f328afec57551a3365ad36d91ded2d Author: Arthur Zamarin <arthurzam@gentoo.org> AuthorDate: 2022-01-16 20:30:19 +0000 Commit: Arthur Zamarin <arthurzam@gentoo.org> CommitDate: 2022-01-16 20:30:19 +0000 dev-python/pillow: drop 8.4.0 Bug: https://bugs.gentoo.org/830934 Signed-off-by: Arthur Zamarin <arthurzam@gentoo.org> dev-python/pillow/Manifest | 1 - dev-python/pillow/pillow-8.4.0.ebuild | 98 ----------------------------------- 2 files changed, 99 deletions(-)
Thanks!