CVE-2023-44271

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-44271
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-44271.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-44271
Aliases
Related
Published
2023-11-03T05:15:30Z
Modified
2025-01-08T15:13:49.820422Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.

References

Affected packages

Debian:11 / pillow

Package

Name
pillow
Purl
pkg:deb/debian/pillow?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.1.2+dfsg-0.3+deb11u2

Affected versions

8.*

8.1.2+dfsg-0.3
8.1.2+dfsg-0.3+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pillow

Package

Name
pillow
Purl
pkg:deb/debian/pillow?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.4.0-1.1+deb12u1

Affected versions

9.*

9.4.0-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pillow

Package

Name
pillow
Purl
pkg:deb/debian/pillow?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.0.0-1

Affected versions

9.*

9.4.0-1.1
9.5.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/python-pillow/pillow

Affected ranges

Type
GIT
Repo
https://github.com/python-pillow/pillow
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0
1.2
1.7.6
1.7.7
1.7.8

2.*

2.0.0
2.1.0
2.2.0
2.2.1
2.2.2
2.3.0
2.5.0
2.6.0
2.6.0-rc1
2.7.0
2.8.0
2.8.1
2.9.0
2.9.0.dev0
2.9.0.dev1
2.9.0.dev2

3.*

3.0.0
3.1.0
3.1.0-rc1
3.2.0
3.3.0
3.3.1
3.4.0

4.*

4.0.0
4.0.0a
4.1.0
4.2.0
4.3.0

5.*

5.0.0
5.1.0
5.2.0
5.3.0
5.4.0

6.*

6.0.0
6.1.0
6.2.0

7.*

7.0.0
7.1.0
7.2.0

8.*

8.0.0
8.1.0
8.2.0
8.3.0
8.4.0

9.*

9.0.0
9.1.0
9.2.0
9.3.0
9.4.0
9.5.0