• [gentoo-announce] [ GLSA 202107-33 ] Pillow: Multiple vulnerabilities

    From John Helmert III@21:1/5 to All on Wed Jul 14 05:30:02 2021
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202107-33
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Pillow: Multiple vulnerabilities
    Date: July 14, 2021
    Bugs: #773559, #774387, #779760
    ID: 202107-33

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in Pillow, the worst of which
    could result in a Denial of Service condition.

    Background
    ==========

    Python Imaging Library (fork)

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 dev-python/pillow < 8.2.0 >= 8.2.0

    Description
    ===========

    Multiple vulnerabilities have been discovered in Pillow. Please review
    the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Pillow users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-python/pillow-8.2.0"

    References
    ==========

    [ 1 ] CVE-2021-25287
    https://nvd.nist.gov/vuln/detail/CVE-2021-25287
    [ 2 ] CVE-2021-25288
    https://nvd.nist.gov/vuln/detail/CVE-2021-25288
    [ 3 ] CVE-2021-25289
    https://nvd.nist.gov/vuln/detail/CVE-2021-25289
    [ 4 ] CVE-2021-25290
    https://nvd.nist.gov/vuln/detail/CVE-2021-25290
    [ 5 ] CVE-2021-25291
    https://nvd.nist.gov/vuln/detail/CVE-2021-25291
    [ 6 ] CVE-2021-25292
    https://nvd.nist.gov/vuln/detail/CVE-2021-25292
    [ 7 ] CVE-2021-25293
    https://nvd.nist.gov/vuln/detail/CVE-2021-25293
    [ 8 ] CVE-2021-27921
    https://nvd.nist.gov/vuln/detail/CVE-2021-27921
    [ 9 ] CVE-2021-27922
    https://nvd.nist.gov/vuln/detail/CVE-2021-27922
    [ 10 ] CVE-2021-27923
    https://nvd.nist.gov/vuln/detail/CVE-2021-27923
    [ 11 ] CVE-2021-28675
    https://nvd.nist.gov/vuln/detail/CVE-2021-28675
    [ 12 ] CVE-2021-28676
    https://nvd.nist.gov/vuln/detail/CVE-2021-28676
    [ 13 ] CVE-2021-28677
    https://nvd.nist.gov/vuln/detail/CVE-2021-28677
    [ 14 ] CVE-2021-28678
    https://nvd.nist.gov/vuln/detail/CVE-2021-28678

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202107-33

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2021 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5


    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDuV1MACgkQXP0dAeB+ Izi0HA/+O+eSlvx4Bnx62NdruKi3vol1xMn12DifNuXvioHnxI15RU18tQJggMJx HQOEEf/9bkWhOPXPIe504VzblCmoc1sGJFQEDS0XrGxNp0PV6978W3czJj0xGcrg Afy2o8DhiwtQYnJ7r3T67VF+XLknlSO7xXlywc1B3HJi4gYJnKHR+T2CKLC326FN pPWEaZj3Rx/JHE5VHZesbRRGcw1iDMbfbuIiu8UOW5yqt/pqDjBtDMd7cly8GP8E tK8kCX+srDtIoLUr33SYB7tdyNGfok3/+QL4JZt54rS0Ia03MlSx15R6oXaq8VIW dK7lCvpwA0w7So7GzbcOtjQ49h64bLQEmqXOawlZbu8tpp40yaOf3gp0c4dTm+qo tqJ8zgM8xk2BjXooAvubH9oDCIIkewPZErb15mfnZq7eBK9aELa+LOmZWNlqfbK7 LStDJBEvnf5mSLqBg+C0mEts7mVEOCixm63Dua+nMqQyi3yLCjkos+DMHornb87d LVYbQw9TMk8PYi3ydCuIt7siuV/W/GSoIfxebOjw6idbRsWNXW+UCQjmUJY9YKqQ 2G3LqnY9I8sjKaskznqgc8Dr+6DH8KxP4np0qy/MMKHaNk2KHwX8ITar0sLxYiJb QZwyjS/kn/nJL27OgxazLISg3Kw3hitmB2M9xXnZpLkfBSjEATU=
    =cZFt
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)