-
pillow (7.0.0-4ubuntu0.9) focal-security; urgency=medium
* SECURITY UPDATE: Buffer overflow in imagingcms.c
- debian/patches/CVE-2024-28219.patch: Use strncpy
to avoid buffer overflow
- CVE-2024-28219
-- Nick Galanis <email address hidden> Fri, 12 Apr 2024 15:21:40 +0100
-
pillow (7.0.0-4ubuntu0.8) focal-security; urgency=medium
* SECURITY UPDATE: DoS in ImageFont via large textlength
- debian/patches/CVE-2023-44271.patch: added a maximum string length in
Tests/test_imagefont.py, docs/reference/ImageFont.rst,
src/PIL/ImageFont.py.
- CVE-2023-44271
* SECURITY UPDATE: PIL.ImageMath.eval Arbitrary Code Execution
- debian/patches/CVE-2023-50447-1.patch: don't allow __ or builtins in
env dictionarys for ImageMath.eval in src/PIL/ImageMath.py.
- debian/patches/CVE-2023-50447-2.patch: allow ops in
Tests/test_imagemath.py, src/PIL/ImageMath.py.
- debian/patches/CVE-2023-50447-3.patch: include further builtins in
Tests/test_imagemath.py, src/PIL/ImageMath.py.
- CVE-2023-50447
-- Marc Deslauriers <email address hidden> Thu, 25 Jan 2024 12:48:42 -0500
-
pillow (7.0.0-4ubuntu0.7) focal-security; urgency=medium
* SECURITY UPDATE: arbitrary file deletion
- debian/patches/CVE-2022-24303.patch: No longer remove temporary images
manually in src/PIL/ImageShow.py.
- CVE-2022-24303
* SECURITY UPDATE: gif decompression bomb issue
- debian/patches/CVE-2022-45198.patch: Added GIF decompression bomb check
in src/PIL/GifImagePlugin.py.
- CVE-2022-45198
-- Fabian Toepfer <email address hidden> Mon, 12 Dec 2022 21:23:40 +0100
-
pillow (7.0.0-4ubuntu0.6) focal-security; urgency=medium
* SECURITY UPDATE: incomplete fix for CVE-2022-22817
- debian/patches/CVE-2022-22817-2.patch: restrict builtins within
lambdas for ImageMath.eval in Tests/test_imagemath.py,
src/PIL/ImageMath.py.
- CVE-2022-22817
-- Marc Deslauriers <email address hidden> Thu, 20 Oct 2022 11:28:59 -0400
-
pillow (7.0.0-4ubuntu0.5) focal-security; urgency=medium
* SECURITY UPDATE: regular expression DoS
- debian/patches/CVE-2021-23437.patch: raise ValueError if color
specifier is too long in Tests/test_imagecolor.py,
src/PIL/ImageColor.py.
- CVE-2021-23437
* SECURITY UPDATE: Dos via buffer overflow
- debian/patches/CVE-2021-34552.patch: limit sprintf modes to 10
characters in src/libImaging/Convert.c.
- CVE-2021-34552
* SECURITY UPDATE: improper initialization
- debian/patches/CVE-2022-22815.patch: initialize coordinates to zero
in src/path.c.
- CVE-2022-22815
* SECURITY UPDATE: buffer over-read during initialization
- debian/patches/CVE-2022-22816.patch: handle case where path count is
zero in src/path.c.
- CVE-2022-22816
* SECURITY UPDATE: evaluation of arbitrary expressions
- debian/patches/CVE-2022-22817.patch: restrict builtins for
ImageMath.eval in Tests/test_imagemath.py, src/PIL/ImageMath.py.
- CVE-2022-22817
-- Marc Deslauriers <email address hidden> Wed, 12 Jan 2022 13:05:20 -0500
-
pillow (7.0.0-4ubuntu0.4) focal-security; urgency=medium
* SECURITY UPDATE: OOB read in Jpeg2KDecode
- debian/patches/CVE-2021-25287_8.patch: handle different widths for
each band in src/libImaging/Jpeg2KDecode.c.
- CVE-2021-25287
- CVE-2021-25288
* SECURITY UPDATE: DOS in PsdImagePlugin
- debian/patches/CVE-2021-28675.patch: sanity check the number of
input layers in Tests/test_decompression_bomb.py,
Tests/test_file_apng.py, Tests/test_file_blp.py,
Tests/test_file_tiff.py, src/PIL/ImageFile.py,
src/PIL/PsdImagePlugin.py.
- CVE-2021-28675
* SECURITY UPDATE: FLI DOS
- debian/patches/CVE-2021-28676.patch: check the block advance in
src/libImaging/FliDecode.c.
- CVE-2021-28676
* SECURITY UPDATE: EPS DOS on _open
- debian/patches/CVE-2021-28677.patch: properly handle line endings in
src/PIL/EpsImagePlugin.py.
- CVE-2021-28677
* SECURITY UPDATE: BLP DOS
- debian/patches/CVE-2021-28678.patch: check that reads return data in
src/PIL/BlpImagePlugin.py.
- CVE-2021-28678
-- Marc Deslauriers <email address hidden> Tue, 18 May 2021 07:19:28 -0400
-
pillow (7.0.0-4ubuntu0.3) focal-security; urgency=medium
* SECURITY UPDATE: insufficient fix for CVE-2020-35654
- debian/patches/CVE-2021-25289.patch: improve return code check in
src/libImaging/TiffDecode.c.
- CVE-2021-25289
* SECURITY UPDATE: negative-offset memcpy with an invalid size
- debian/patches/CVE-2021-25290.patch: add extra check to
src/libImaging/TiffDecode.c.
- CVE-2021-25290
* SECURITY UPDATE: invalid tile boundaries could lead to an OOB Read
- debian/patches/CVE-2021-25291.patch: check tile validity in
src/libImaging/TiffDecode.c.
- CVE-2021-25291
* SECURITY UPDATE: DoS via backtrack regex
- debian/patches/CVE-2021-25292.patch: use more specific regex in
src/PIL/PdfParser.py.
- CVE-2021-25292
* SECURITY UPDATE: Out of Bounds Read
- debian/patches/CVE-2021-25293.patch: add more checks to
src/libImaging/SgiRleDecode.c.
- CVE-2021-25293
* SECURITY UPDATE: DoS via invalid reported size
- debian/patches/CVE-2021-2792x.patch: check reported sizes in
src/PIL/BlpImagePlugin.py, src/PIL/IcnsImagePlugin.py,
src/PIL/IcoImagePlugin.py.
- CVE-2021-27921
- CVE-2021-27922
- CVE-2021-27923
-- Marc Deslauriers <email address hidden> Wed, 10 Mar 2021 12:48:44 -0500
-
pillow (7.0.0-4ubuntu0.2) focal-security; urgency=medium
* SECURITY UPDATE: buffer over-read via PCX file
- debian/patches/CVE-2020-35653.patch: don't trust the image to specify
a buffer size in src/PIL/PcxImagePlugin.py.
- CVE-2020-35653
* SECURITY UPDATE: heap overflow via YCbCr files
- debian/patches/CVE-2020-35654-1.patch: fix tiff comparison warnings
in src/libImaging/TiffDecode.c.
- debian/patches/CVE-2020-35654-2.patch: fix OOB write in
src/libImaging/TiffDecode.c.
- debian/patches/CVE-2020-35654-3.patch: rework ReadTile in
src/libImaging/TiffDecode.c.
- CVE-2020-35654
* SECURITY UPDATE: buffer over-read via SGI RLE image file
- debian/patches/CVE-2020-35655-1.patch: add checks to
src/libImaging/SgiRleDecode.c.
- debian/patches/CVE-2020-35655-2.patch: rework error flags in
src/libImaging/SgiRleDecode.c.
- CVE-2020-35655
-- Marc Deslauriers <email address hidden> Wed, 13 Jan 2021 09:55:14 -0500
-
pillow (7.0.0-4ubuntu0.1) focal-security; urgency=medium
* SECURITY UPDATE: multiple out of bounds reads
- debian/patches/CVE-2020-10177-1.patch: fix issue in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-2.patch: refactor to macro in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-3.patch: fix OOB Reads in SS2 Chunk in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-4.patch: fix OOB in LC packet in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-5.patch: fix OOB Advance Values in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-6.patch: fix OOB Read in FLI Copy Chunk
in src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-7.patch: fix comments in
src/libImaging/FliDecode.c.
- debian/patches/CVE-2020-10177-8.patch: additional FLI check in
src/libImaging/FliDecode.c.
- CVE-2020-10177
* SECURITY UPDATE: out of bounds read with PCX files
- debian/patches/CVE-2020-10378.patch: fix OOB Access in
src/libImaging/PcxDecode.c.
- CVE-2020-10378
* SECURITY UPDATE: two buffer overflows
- debian/patches/CVE-2020-10379-1.patch: ensure that Tiff's concept of
Strip and Tilesize matches Pillow's in src/libImaging/TiffDecode.c.
- debian/patches/CVE-2020-10379-2.patch: avoid uninitialized read in
src/libImaging/TiffDecode.c.
- debian/patches/CVE-2020-10379-3.patch: fix typos in
src/libImaging/TiffDecode.c.
- CVE-2020-10379
* SECURITY UPDATE: out-of-bounds read via JP2 file
- debian/patches/CVE-2020-10994-1.patch: fix for OOB Read in
src/libImaging/Jpeg2KDecode.c.
- debian/patches/CVE-2020-10994-2.patch: fix typo in
src/libImaging/Jpeg2KDecode.c.
- CVE-2020-10994
* SECURITY UPDATE: out-of-bounds read via SGI file
- debian/patches/CVE-2020-11538.patch: track number of pixels, not the
number of runs in src/libImaging/SgiRleDecode.c.
- CVE-2020-11538
-- Marc Deslauriers <email address hidden> Tue, 07 Jul 2020 13:14:10 -0400
-
pillow (7.0.0-4build1) focal; urgency=medium
* No-change rebuild to drop python3.7.
-- Matthias Klose <email address hidden> Tue, 18 Feb 2020 10:44:40 +0100
-
pillow (7.0.0-4) unstable; urgency=medium
* Don't rely on python2's python.mk in the build.
* Bump standards version.
-- Matthias Klose <email address hidden> Wed, 29 Jan 2020 08:33:20 +0100
-
pillow (7.0.0-3) unstable; urgency=medium
* Drop the Python2 autopkg tests.
-- Matthias Klose <email address hidden> Sun, 12 Jan 2020 09:54:31 +0100
-
pillow (7.0.0-2) unstable; urgency=medium
* Build-depend on python2 for the use of python.mk.
-- Matthias Klose <email address hidden> Mon, 06 Jan 2020 16:19:39 +0100
-
pillow (6.2.1-2) unstable; urgency=medium
* Call python2 in the autopkg python2 tests.
-- Matthias Klose <email address hidden> Mon, 04 Nov 2019 08:41:21 +0100
-
pillow (6.2.1-1) unstable; urgency=medium
* New upstream version, "last Pillow release to support Python 2.7".
* Replaces python-dbg debpendencies with python2-dbg.
* Remove Python2 suggests.
-- Matthias Klose <email address hidden> Sat, 26 Oct 2019 16:49:09 +0200
-
pillow (6.2.0-1) unstable; urgency=medium
* New upstream version, last version supporting Python2.
* Bump standards version.
-- Matthias Klose <email address hidden> Wed, 16 Oct 2019 15:47:42 +0200
-
pillow (6.1.0-1build1) focal; urgency=medium
* No-change rebuild to build with python3.8.
-- Matthias Klose <email address hidden> Fri, 18 Oct 2019 18:08:59 +0000
-
pillow (6.1.0-1) unstable; urgency=medium
* New upstream version.
-- Matthias Klose <email address hidden> Sun, 07 Jul 2019 14:36:49 +0200