-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2704
                          pillow security update
                             11 November 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pillow
Publisher:         Debian
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
                   Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-9190 CVE-2016-9189 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3710

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running pillow check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3710-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 10, 2016                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : pillow
CVE ID         : CVE-2016-9189 CVE-2016-9190

Cris Neckar discovered multiple vulnerabilities in Pillow, a Python
imaging library, which may result in the execution of arbitrary code or
information disclosure if a malformed image file is processed.

For the stable distribution (jessie), these problems have been fixed in
version 2.6.1-2+deb8u3.

For the testing distribution (stretch), these problems have been fixed
in version 3.4.2-1.

For the unstable distribution (sid), these problems have been fixed in
version 3.4.2-1.

We recommend that you upgrade your pillow packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=N5cx
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Mf9L
-----END PGP SIGNATURE-----