Fedora 33: python-pillow 2021-77756994ba
Summary
Python image processing library, fork of the Python Imaging Library (PIL)
This library provides extensive file format support, an efficient
internal representation, and powerful image processing capabilities.
There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt),
devel (development) and doc (documentation).
Backport fix for CVE-2021-28675 - CVE-2021-28678, CVE-2021-25287-CVE-2021-25288
* Mon May 24 2021 Sandro Mani
- Backport fix for CVE-2021-28675 - CVE-2021-28678, CVE-2021-25287-CVE-2021-25288
[ 1 ] Bug #1958228 - CVE-2021-25287 python-pillow: out-of-bounds read in J2kDecode in j2ku_graya_la [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958228
[ 2 ] Bug #1958230 - CVE-2021-25287 mingw-python-pillow: python-pillow: out-of-bounds read in J2kDecode in j2ku_graya_la [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958230
[ 3 ] Bug #1958232 - CVE-2021-25288 python-pillow: out-of-bounds read in J2kDecode in j2ku_gray_i [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958232
[ 4 ] Bug #1958235 - CVE-2021-25288 mingw-python-pillow: python-pillow: out-of-bounds read in J2kDecode in j2ku_gray_i [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958235
[ 5 ] Bug #1958241 - CVE-2021-28675 python-pillow: DoS in PsdImagePlugin [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958241
[ 6 ] Bug #1958244 - CVE-2021-28675 mingw-python-pillow: python-pillow: DoS in PsdImagePlugin [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958244
[ 7 ] Bug #1958253 - CVE-2021-28676 python-pillow: infinite loop in FliDecode.c can lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958253
[ 8 ] Bug #1958256 - CVE-2021-28676 mingw-python-pillow: python-pillow: infinite loop in FliDecode.c can lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958256
[ 9 ] Bug #1958259 - CVE-2021-28677 python-pillow: DoS in the open phase via a malicious EPS file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958259
[ 10 ] Bug #1958261 - CVE-2021-28677 mingw-python-pillow: python-pillow: DoS in the open phase via a malicious EPS file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958261
[ 11 ] Bug #1958264 - CVE-2021-28678 python-pillow: improper check in BlpImagePlugin can lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958264
[ 12 ] Bug #1958267 - CVE-2021-28678 mingw-python-pillow: python-pillow: improper check in BlpImagePlugin can lead to DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958267
su -c 'dnf upgrade --advisory FEDORA-2021-77756994ba' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
FEDORA-2021-77756994ba 2021-06-03 01:00:28.778011 Product : Fedora 33 Version : 7.2.0 Release : 6.fc33 URL : https://python-pillow.org/ Summary : Python image processing library Description : Python image processing library, fork of the Python Imaging Library (PIL) This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. There are four subpackages: tk (tk interface), qt (PIL image wrapper for Qt), devel (development) and doc (documentation). Backport fix for CVE-2021-28675 - CVE-2021-28678, CVE-2021-25287-CVE-2021-25288 * Mon May 24 2021 Sandro Mani - 7.2.0-6 - Backport fix for CVE-2021-28675 - CVE-2021-28678, CVE-2021-25287-CVE-2021-25288 [ 1 ] Bug #1958228 - CVE-2021-25287 python-pillow: out-of-bounds read in J2kDecode in j2ku_graya_la [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958228 [ 2 ] Bug #1958230 - CVE-2021-25287 mingw-python-pillow: python-pillow: out-of-bounds read in J2kDecode in j2ku_graya_la [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958230 [ 3 ] Bug #1958232 - CVE-2021-25288 python-pillow: out-of-bounds read in J2kDecode in j2ku_gray_i [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958232 [ 4 ] Bug #1958235 - CVE-2021-25288 mingw-python-pillow: python-pillow: out-of-bounds read in J2kDecode in j2ku_gray_i [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958235 [ 5 ] Bug #1958241 - CVE-2021-28675 python-pillow: DoS in PsdImagePlugin [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958241 [ 6 ] Bug #1958244 - CVE-2021-28675 mingw-python-pillow: python-pillow: DoS in PsdImagePlugin [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958244 [ 7 ] Bug #1958253 - CVE-2021-28676 python-pillow: infinite loop in FliDecode.c can lead to DoS [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958253 [ 8 ] Bug #1958256 - CVE-2021-28676 mingw-python-pillow: python-pillow: infinite loop in FliDecode.c can lead to DoS [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958256 [ 9 ] Bug #1958259 - CVE-2021-28677 python-pillow: DoS in the open phase via a malicious EPS file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958259 [ 10 ] Bug #1958261 - CVE-2021-28677 mingw-python-pillow: python-pillow: DoS in the open phase via a malicious EPS file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958261 [ 11 ] Bug #1958264 - CVE-2021-28678 python-pillow: improper check in BlpImagePlugin can lead to DoS [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958264 [ 12 ] Bug #1958267 - CVE-2021-28678 mingw-python-pillow: python-pillow: improper check in BlpImagePlugin can lead to DoS [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958267 su -c 'dnf upgrade --advisory FEDORA-2021-77756994ba' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Change Log
References