Lucene search

K
amazonAmazonALAS-2024-2508
HistoryMar 27, 2024 - 9:32 p.m.

Medium: python-pillow

2024-03-2721:32:00
alas.aws.amazon.com
10
python-pillow
denial of service
uncontrolled memory allocation
command injection
cve-2023-44271
amazon linux 2
update
red hat
mitre

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

21.9%

Issue Overview:

An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. (CVE-2023-44271)

Affected versions of this package are vulnerable to Denial of Service (DoS) when using arbitrary strings as text input and the number of characters passed into PIL.ImageFont.ImageFont.getmask() is over a certain limit. This can lead to a system crash.

Affected versions of this package are vulnerable to Denial of Service (DoS) if the size of individual glyphs extends beyond the bitmap image, when using PIL.ImageFont.ImageFont function. Exploiting this vulnerability could lead to a system crash.

Affected versions of this package are vulnerable to Command Injection in filenames that contain single quotes via load_djpeg.

Affected Packages:

python-pillow

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update python-pillow to update your system.

New Packages:

aarch64:  
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.12.aarch64  
  
i686:  
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.12.i686  
  
src:  
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.12.src  
  
x86_64:  
    python-pillow-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  
    python-pillow-devel-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  
    python-pillow-doc-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  
    python-pillow-sane-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  
    python-pillow-tk-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  
    python-pillow-debuginfo-2.0.0-23.gitd1c6db8.amzn2.0.12.x86_64  

Additional References

Red Hat: CVE-2023-44271

Mitre: CVE-2023-44271

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

21.9%