-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple memory corruption vulnerabilities #2105
Comments
Hi Cris, Thanks for getting in touch. We can't make this issue private, but please email [email protected] Edit: you can also email [email protected] (#1713 (comment)) |
@hugovk, thanks for the info. I will send details today. |
Security@ is better, since it skips the step of @aclark4life forwarding it to me. |
@wiredfool [email protected] correct? |
I was going to say yes, but apparently it's not doing that right now. |
Should be working, check your spam folder? I'll forward just in case. |
Oh, I think see what happened: I forgot I had to maintain a |
Just wanted to follow-up quickly and make sure that all of the details got We are also more than happy to help in any way we can. Thanks! On Wed, Sep 7, 2016 at 4:43 AM, Alex Clark [email protected] wrote:
|
Yep, I've got it, we'll definitely have something by the next release, scheduled for Oct 1. I'll probably issue a source only point release for 3.3.x as well. |
Perfect! Thanks for the update. On Tue, Sep 20, 2016 at 9:27 AM, wiredfool [email protected] wrote:
|
Fixed and released, right? |
Yep, in both 3.4.0 and 3.3.2 |
For future reference, here's the PR: #2146 |
While performing a security assessment for a client, we identified a number of potential memory corruption vulnerabilities within the native extensions included with Pillow. Given that these vulnerabilities may currently expose exploitable conditions within our client's environment, we would like to report the details privately.
Could a project member please limit the visibility of this issue so that it is not available to the public?
Alternatively, we can provide vulnerability details via e-mail if that is preferable.
Thank you,
Cris Neckar
Divergent Security
The text was updated successfully, but these errors were encountered: