From mboxrd@z Thu Jan 1 00:00:00 1970 From: Leo Famulari Subject: bug#22858: Patch security vulnerability in python-pillow Date: Mon, 29 Feb 2016 16:47:24 -0500 Message-ID: <20160229214724.GA23259@jasmine> References: <87twkrl1l2.fsf@dustycloud.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:48654) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1aaVfi-0003G1-Nf for bug-guix@gnu.org; Mon, 29 Feb 2016 16:48:07 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1aaVfe-0007Dp-MM for bug-guix@gnu.org; Mon, 29 Feb 2016 16:48:06 -0500 Received: from debbugs.gnu.org ([208.118.235.43]:57078) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1aaVfe-0007Dk-CY for bug-guix@gnu.org; Mon, 29 Feb 2016 16:48:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84) (envelope-from ) id 1aaVfe-0001EF-4p for bug-guix@gnu.org; Mon, 29 Feb 2016 16:48:02 -0500 Sender: "Debbugs-submit" Resent-Message-ID: Content-Disposition: inline In-Reply-To: <87twkrl1l2.fsf@dustycloud.org> List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org Sender: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org To: Christopher Allan Webber Cc: 22858@debbugs.gnu.org On Mon, Feb 29, 2016 at 12:10:33PM -0800, Christopher Allan Webber wrote: > See: https://lwn.net/Articles/677914/ > > > Package : pillow > > CVE ID : CVE-2016-0740 CVE-2016-0775 CVE-2016-2533 > > > > Multiple security vulnerabilities have been found in Pillow, a Python > > imaging library, which may result in denial of service or the execution > > of arbitrary code if a malformed FLI, PCD or Tiff files is processed. > > > > For the oldstable distribution (wheezy), this problem has been fixed > > in version 1.1.7-4+deb7u2 of the python-imaging source package. > > > > For the stable distribution (jessie), this problem has been fixed in > > version 2.6.1-2+deb8u2. > > > > For the testing distribution (stretch), this problem has been fixed > > in version 3.1.1-1. > > > > For the unstable distribution (sid), this problem has been fixed in > > version 3.1.1-1. > > > > We recommend that you upgrade your pillow packages. > > > > Further information about Debian Security Advisories, how to apply > > these updates to your system and frequently asked questions can be > > found at: https://www.debian.org/security/ > > I'm trying to figure out where the patches for this are, but I can't > find them. I expected them to maybe be here, but I don't see them here: I updated python-pillow to 3.1.1 with 16095d2729, fixing these issues. When I did that, CVE-2016-2533 wasn't named yet, but my understanding is that the update does address it: https://github.com/python-pillow/Pillow/commits/e5324bd3b4195d68d4a066b16d912fca30d3c4be Python2-pil *is* vulnerable. However, it seems to have no users in our source tree. Should we remove it?