Closed mend-bolt-for-github[bot] closed 1 hour ago
:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #59
:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #59
Vulnerable Library - Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/54/4f/346b8ea1b772cb6e802ed32a78b18627be6a9d9a29755fa82ea436bb582e/Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl
Found in HEAD commit: 43e38e17b3a67be4ee140e681881f166c1b82627
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-50447
### Vulnerable Library - Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whlPython Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/54/4f/346b8ea1b772cb6e802ed32a78b18627be6a9d9a29755fa82ea436bb582e/Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl
Dependency Hierarchy: - :x: **Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl** (Vulnerable Library)
Found in HEAD commit: 43e38e17b3a67be4ee140e681881f166c1b82627
Found in base branch: master
### Vulnerability DetailsPillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Publish Date: 2024-01-19
URL: CVE-2023-50447
### CVSS 3 Score Details (8.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://www.openwall.com/lists/oss-security/2024/01/20/1
Release Date: 2024-01-19
Fix Resolution: pillow - 10.2.0
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)CVE-2023-44271
### Vulnerable Library - Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whlPython Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/54/4f/346b8ea1b772cb6e802ed32a78b18627be6a9d9a29755fa82ea436bb582e/Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl
Dependency Hierarchy: - :x: **Pillow-9.4.0-cp311-cp311-manylinux_2_28_x86_64.whl** (Vulnerable Library)
Found in HEAD commit: 43e38e17b3a67be4ee140e681881f166c1b82627
Found in base branch: master
### Vulnerability DetailsAn issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
Publish Date: 2023-11-03
URL: CVE-2023-44271
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2023-11-03
Fix Resolution: Pillow - 10.0.0
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)