Gentoo has issued an advisory on December 31: https://security.gentoo.org/glsa/201612-52 This is the last issue reference in the 3.1.1 release notes: https://github.com/python-pillow/Pillow/blob/777ef4f523679a9ea0f3573efc224bf821b6abe7/docs/releasenotes/3.1.1.rst But I failed to include it in the Bug 17671 update.
Assigning to the registered maintainer.
Keywords: (none) => TriagedCC: (none) => marja11Assignee: bugsquad => makowski.mageia
So according to https://security.gentoo.org/glsa/201612-52 it have a CVE https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4009 and it is this upstream patch https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e But according to https://security-tracker.debian.org/tracker/CVE-2016-4009 "Upstream confirmed that versions prior 2.7 are not vulnerable." So I think we can close this bug, (in Cauldron we have 3.4.2 that have this issue fixed)
Status: NEW => RESOLVEDResolution: (none) => INVALID