Lucene search

K
mageiaGentoo FoundationMGASA-2024-0133
HistoryApr 15, 2024 - 9:21 p.m.

Updated python-pillow packages fix security vulnerabilities

2024-04-1521:21:57
Gentoo Foundation
advisories.mageia.org
32
python-pillow
security update
denial of service
buffer overflow
memory allocation
imagefont
imagedraw
truetype
strcpy
strncpy
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

22.8%

CVE-2023-44271 Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. CVE-2024-28219 A buffer overflow exists because strcpy is used instead of strncpy.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchpython-pillow< 9.2.0-3.2python-pillow-9.2.0-3.2.mga9

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

22.8%