From owner-svn-ports-head@freebsd.org Sun Dec 4 23:03:29 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6DBD0C67A3B; Sun, 4 Dec 2016 23:03:29 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 236A9C4C; Sun, 4 Dec 2016 23:03:29 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uB4N3SXm051810; Sun, 4 Dec 2016 23:03:28 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uB4N3SQw051808; Sun, 4 Dec 2016 23:03:28 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201612042303.uB4N3SQw051808@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Sun, 4 Dec 2016 23:03:28 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r427816 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 04 Dec 2016 23:03:29 -0000 Author: feld Date: Sun Dec 4 23:03:27 2016 New Revision: 427816 URL: https://svnweb.freebsd.org/changeset/ports/427816 Log: Document py-pillow vulnerabilities PR: 214410 Security: CVE-2016-9189 Security: CVE-2016-9190 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Dec 4 22:52:26 2016 (r427815) +++ head/security/vuxml/vuln.xml Sun Dec 4 23:03:27 2016 (r427816) @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + Pillow -- multiple vulnerabilities + + + py27-pillow + py33-pillow + py34-pillow + py35-pillow + 3.3.2 + + + + +

Pillow reports:

+
+

Pillow prior to 3.3.2 may experience integer overflow + errors in map.c when reading specially crafted image files. This may + lead to memory disclosure or corruption.

+

Pillow prior to 3.3.2 and PIL 1.1.7 (at least) do not check + for negative image sizes in ImagingNew in Storage.c. A negative image + size can lead to a smaller allocation than expected, leading to arbi + trary writes.

+
+ +
+ + http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html + https://github.com/python-pillow/Pillow/issues/2105 + CVE-2016-9189 + CVE-2016-9190 + ports/214410 + + + 2016-09-06 + 2016-12-04 + +
+ ImageMagick -- heap overflow vulnerability