First published: Tue Jan 30 2024(Updated: )
It was discovered that Pillow incorrectly handled certain long text arguments. An attacker could possibly use this issue to cause Pillow to consume resources, leading to a denial of service. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-44271) Duarte Santos discovered that Pillow incorrectly handled the environment parameter to PIL.ImageMath.eval. An attacker could possibly use this issue to execute arbitrary code. (CVE-2023-50447)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-pil | <10.0.0-1ubuntu0.1 | 10.0.0-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/python3-pil | <9.0.1-1ubuntu0.2 | 9.0.1-1ubuntu0.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-pil | <7.0.0-4ubuntu0.8 | 7.0.0-4ubuntu0.8 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6618-1 is regarded as high due to the potential for denial of service through resource exhaustion.
To fix USN-6618-1, users should upgrade the python3-pil package to the recommended version depending on their Ubuntu release.
USN-6618-1 affects Ubuntu 20.04 LTS and Ubuntu 22.04 LTS due to vulnerabilities in the python3-pil package.
The specific vulnerable package in USN-6618-1 is python3-pil, which has issues handling long text arguments.
An attacker can exploit USN-6618-1 to leverage resource consumption vulnerabilities in Pillow, potentially causing a denial of service.