2022-05-15 09:18:24 +03:00
|
|
|
9.1.1
|
|
|
|
-----
|
|
|
|
|
|
|
|
Security
|
|
|
|
========
|
|
|
|
|
2024-03-14 20:58:05 +03:00
|
|
|
This release addresses several security issues.
|
2022-05-15 09:18:24 +03:00
|
|
|
|
2024-03-14 20:58:05 +03:00
|
|
|
:cve:`2022-30595`: Heap buffer overflow
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
2024-03-13 21:40:00 +03:00
|
|
|
|
2024-03-13 21:15:16 +03:00
|
|
|
When reading a TGA file with RLE packets that cross scan lines,
|
2022-05-15 09:18:24 +03:00
|
|
|
Pillow reads the information past the end of the first line without deducting that
|
|
|
|
from the length of the remaining file data. This vulnerability was introduced in Pillow
|
|
|
|
9.1.0, and can cause a heap buffer overflow.
|
|
|
|
|
2024-03-17 10:30:56 +03:00
|
|
|
Decompression bomb check fix
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
2022-05-15 09:18:24 +03:00
|
|
|
Opening an image with a zero or negative height has been found to bypass a
|
|
|
|
decompression bomb check. This will now raise a :py:exc:`SyntaxError` instead, in turn
|
|
|
|
raising a ``PIL.UnidentifiedImageError``.
|