|
Pillow
|
3.0.0
|
<12.2.0
|
show Affected versions of the pillow package are vulnerable to Integer Overflow due to unchecked accumulation of glyph advance values while tracking the current rendering position during font processing. When a font supplies an excessively large advance for each glyph, the running position counter wraps around because the arithmetic is performed in a fixed-width integer type that cannot represent the resulting magnitude. A remote attacker who can supply a crafted font file to a target that uses Pillow's font rendering can trigger the overflow, leading to incorrect memory calculations and potential memory corruption.
|
|
Pillow
|
3.0.0
|
<10.0.0
|
show Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
https://github.com/python-pillow/Pillow/pull/7244
|
|
Pillow
|
3.0.0
|
<6.2.2
|
show libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
|
|
Pillow
|
3.0.0
|
<10.3.0
|
show Pillow 10.3.0 introduces a security update addressing CVE-2024-28219 by replacing certain functions with strncpy to prevent buffer overflow issues.
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-25289: TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<8.2.0
|
show Pillow version 8.2.0 includes a fix for CVE-2021-28677: For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/
https://github.com/python-pillow/Pillow/pull/5377
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open
|
|
Pillow
|
3.0.0
|
<7.1.0
|
show In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.
|
|
Pillow
|
3.0.0
|
<8.1.0
|
show Pillow 8.1.0 includes a fix for SGI Decode buffer overrun. CVE-2020-35655 #5173.
|
|
Pillow
|
3.0.0
|
<8.1.0
|
show Pillow 8.1.0 fixes TIFF OOB Write error. CVE-2020-35654 #5175.
|
|
Pillow
|
3.0.0
|
<3.1.1
|
show Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
|
|
Pillow
|
3.0.0
|
<8.3.0
|
show Pillow 8.3.0 includes a fix for CVE-2021-34552: Pillow through 8.2.0 and PIL (also known as Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
|
|
Pillow
|
3.0.0
|
<9.0.0
|
show Pillow 9.0.0 includes a fix for CVE-2022-22816: path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
|
|
Pillow
|
3.0.0
|
<8.2.0
|
show Pillow version 8.2.0 includes a fix for CVE-2021-28676: For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/
https://github.com/python-pillow/Pillow/pull/5377
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos
|
|
Pillow
|
3.0.0
|
<9.0.1
|
show Pillow 9.0.1 includes a fix for CVE-2022-22817: PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A first patch was issued for version 9.0.0 but it did not prevent builtins available to lambda expressions.
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
|
|
Pillow
|
3.0.0
|
<6.2.0
|
show Pillow 6.2.0 includes a fix for CVE-2019-16865: An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
|
|
Pillow
|
3.0.0
|
<9.0.0
|
show Pillow 9.0.0 includes a fix for CVE-2022-22815: path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
|
|
Pillow
|
3.0.0
|
<7.1.0
|
show Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c.
|
|
Pillow
|
3.0.0
|
<=7.0.0
|
show In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.
|
|
Pillow
|
3.0.0
|
<3.3.2
|
show Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
|
|
Pillow
|
3.0.0
|
<7.1.0
|
show In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c.
|
|
Pillow
|
3.0.0
|
<3.1.1
|
show Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
|
|
Pillow
|
3.0.0
|
<3.1.1
|
show Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
|
|
Pillow
|
3.0.0
|
<3.3.2
|
show Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
|
|
Pillow
|
3.0.0
|
<8.2.0
|
show Pillow 8.2.0 includes a fix for CVE-2021-25288: There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-25292: The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<9.0.1
|
show Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
|
|
Pillow
|
3.0.0
|
<6.2.2
|
show There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.
|
|
Pillow
|
3.0.0
|
<9.0.0
|
show Pillow 9.0.0 excludes carriage return in PDF regex to help prevent ReDoS.
https://github.com/python-pillow/Pillow/pull/5912
https://github.com/python-pillow/Pillow/commit/43b800d933c996226e4d7df00c33fcbe46d97363
|
|
Pillow
|
3.0.0
|
>=2.5.0,<10.0.1
|
show Pillow 10.0.1 updates its C dependency 'libwebp' to 1.3.2 to include a fix for a high-risk vulnerability.
https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-25293: There is an out-of-bounds read in SGIRleDecode.c.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<7.1.0
|
show In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.
|
|
Pillow
|
3.0.0
|
<8.1.0
|
show In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-27921: Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<3.1.1
|
show Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
|
|
Pillow
|
3.0.0
|
>=0,<8.2.0
|
show An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
|
|
Pillow
|
3.0.0
|
<6.2.2
|
show libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
|
|
Pillow
|
3.0.0
|
<10.2.0
|
show Pillow is affected by an arbitrary code execution vulnerability. If an attacker has control over the keys passed to the environment argument of PIL.ImageMath.eval(), they may be able to execute arbitrary code.
https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-25291: In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<6.2.2
|
show libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-25290: In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<8.0.1
|
show Pillow 8.0.1 updates 'FreeType' used in binary wheels to v2.10.4 to include a security fix.
|
|
Pillow
|
3.0.0
|
<9.0.0
|
show Pillow 9.0.0 ensures JpegImagePlugin stops at the end of a truncated file to avoid Denial of Service attacks.
https://github.com/python-pillow/Pillow/pull/5921
https://github.com/advisories/GHSA-4fx9-vc88-q2xc
|
|
Pillow
|
3.0.0
|
<10.2.0
|
show Pillow is potentially vulnerable to DoS attacks through PIL.ImageFont.ImageFont.getmask(). A decompression bomb check has also been added to the affected function.
|
|
Pillow
|
3.0.0
|
<9.2.0
|
show Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).
|
|
Pillow
|
3.0.0
|
<8.2.0
|
show Pillow 8.2.0 includes a fix for CVE-2021-25287: There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode
|
|
Pillow
|
3.0.0
|
<8.2.0
|
show Pillow version 8.2.0 includes a fix for CVE-2021-28678: For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/
https://github.com/python-pillow/Pillow/pull/5377
https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos
|
|
Pillow
|
3.0.0
|
<8.1.1
|
show Pillow 8.1.1 includes a fix for CVE-2021-27922: Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
|
|
Pillow
|
3.0.0
|
<3.1.2
|
show pillow before 3.1.2 is vulnerable to an integer overflow in Jpeg2KEncode.c causing a buffer overflow. CVE-2016-3076.
|
|
Pillow
|
3.0.0
|
<6.2.2
|
show libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
|
|
django-allauth
|
0.24.1
|
<0.54.0
|
show Django-allauth 0.54.0 includes a security fix: Even when account enumeration prevention was turned on, it was possible for an attacker to infer whether or not a given account exists based upon the response time of an authentication attempt.
|
|
django-allauth
|
0.24.1
|
<65.14.1
|
show Affected versions of the django-allauth package are vulnerable to Open Redirect due to improper validation of the SAML RelayState parameter when IdP-initiated SSO is enabled. In the SAML login flow, django-allauth accepts any URL supplied in RelayState and uses it as the post-authentication redirect target, allowing untrusted external destinations to be processed without restriction when IdP-initiated SSO is turned on, which is disabled by default.
|
|
django-allauth
|
0.24.1
|
<0.34.0
|
show On django-allauth before 0.34.0 the "Set Password" view did not properly check whether or not the user already had a usable password set. This allowed an attacker to set the password without providing the current password, but only in case the attacker already gained control over the victim's session.
|
|
django-allauth
|
0.24.1
|
<65.3.0
|
show Affected versions of allauth are vulnerable to account enumeration through timing attacks (CWE-203). This vulnerability allows attackers to determine the existence of user accounts by measuring response times during email/password authentication attempts. The issue resides in the AuthenticationBackend._authenticate_by_email method, which did not mitigate timing discrepancies. Exploitation can be performed remotely with high feasibility. Users should update to the latest version of allauth to apply the implemented timing attack mitigations.
|
|
django-allauth
|
0.24.1
|
<0.63.3
|
show Affected versions of Django-allauth are vulnerable to CSRF and replay attacks in the SAML login flow. RelayStatewas used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it was not signed, causing the vulnerability.
|
|
django-allauth
|
0.24.1
|
<0.28.0
|
show Django-allauth before 0.28.0 contained a vulnerability allowing an attacker to alter the provider specific settings for 'SCOPE' and/or 'AUTH_PARAMS' (part of the larger 'SOCIALACCOUNT_PROVIDERS' setting). The changes would persist across subsequent requests for all users, provided these settings were explicitly set within your project. These settings translate directly into request parameters, giving the attacker undesirable control over the OAuth(2) handshake. You are not affected if you did not explicitly configure these settings.
https://github.com/pennersr/django-allauth/commit/492ba9739b323cb66ef4020259c1db2d49cb6526
|
|
django-allauth
|
0.24.1
|
<0.47.0
|
show Django-allauth 0.47.0 adds a new setting 'SOCIALACCOUNT_LOGIN_ON_GET' that controls whether or not the endpoints for initiating a social login (for example, "/accounts/google/login/") require a POST request to initiate the handshake. As requiring a POST is more secure, the default of this new setting is 'False'. This is useful to prevent redirect attacks.
|
|
django-allauth
|
0.24.1
|
<0.63.6
|
show In Django-allauth, a vulnerability allows attackers to inject arbitrary JavaScript into the login page when configuring the Facebook provider to use the `js_sdk` method, potentially compromising user sessions or stealing sensitive information.
|
|
django-allauth
|
0.24.1
|
<0.30.0
|
show Django-allauth 0.30.0 includes a fix for a Denial of Service vulnerability.
https://github.com/pennersr/django-allauth/commit/8dc2f2d5cc3ce0e5e1b999129ceaa57ed4e75390
|
|
django-allauth
|
0.24.1
|
<65.13.0
|
show Affected versions of the django-allauth package are vulnerable to Authorization Bypass due to the use of a mutable identifier (preferred_username) from third-party providers for authorization decisions. The authentication logic in django-allauth’s social account handling uses the preferred_username field from Okta and NetIQ OpenID Connect identity providers as the canonical user identifier, which may be changed by an attacker and is not stable enough to base authorization on; the code fails to validate that the identifier is immutable.
|
|
django-allauth
|
0.24.1
|
<0.33.0
|
show Django-allauth 0.33 includes a security fix: Leakage of password reset token on a third-party website through the Referer header.
|
|
django-allauth
|
0.24.1
|
<0.41.0
|
show Django-allauth 0.41.0 conforms to the general Django 3.0.1, 2.2.9, and 1.11.27 security release. See CVE-2019-19844 and <https://www.djangoproject.com/weblog/2019/dec/18/security-releases/>.
|
|
django-allauth
|
0.24.1
|
<65.13.0
|
show Affected versions of the django-allauth package are vulnerable to Insufficient Session Expiration due to access and refresh tokens remaining valid after the associated user account is deactivated. In django-allauth’s IdP OpenID Connect implementation, allauth/idp/oidc/internal/oauthlib/request_validator.py does not check instance.user.is_active in validate_bearer_token() and validate_refresh_token(), and allauth/idp/oidc/internal/oauthlib/device_codes.py previously returned token state without revalidating the user’s active status.
|
|
gevent
|
1.0.2
|
<24.10.1
|
show Affected versions of gevent are potentially vulnerable to a Race Condition leading to Unauthorized Access — CWE-362.
|
|
gevent
|
1.0.2
|
<23.9.0
|
show An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
|
|
gevent
|
1.0.2
|
<25.4.2
|
show Affected versions of gevent were potentially vulnerable to HTTP request smuggling. The issue existed in the pywsgi Input._send_100_continue handling.
|
|
gevent
|
1.0.2
|
<1.2a1
|
show Gevent 1.2a1 no longer prints the entire WSGI environment by default for errors logged by :class:'~gevent.pywsgi.WSGIHandler'.
https://github.com/gevent/gevent/pull/781
|