-
Notifications
You must be signed in to change notification settings - Fork 5
Description
Vulnerable Library - pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/87/0d/8f5136a5481731c342a901ff155c587ce7804114db069345e1894ab4978a/pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260219120409_AEEMWL/python_IKDEBG/20260219120410/pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Found in HEAD commit: c2a0de4212c13487918a46a2935ca84031dd91aa
Vulnerabilities
| Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (pillow version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2024-28219 | 6.7 | Not Defined | 0.3% | pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl | Direct | pillow - 10.3.0 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-28219
Vulnerable Library - pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/87/0d/8f5136a5481731c342a901ff155c587ce7804114db069345e1894ab4978a/pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /tmp/ws-ua_20260219120409_AEEMWL/python_IKDEBG/20260219120410/pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl
Dependency Hierarchy:
- ❌ pillow-10.2.0-cp39-cp39-manylinux_2_28_x86_64.whl (Vulnerable Library)
Found in HEAD commit: c2a0de4212c13487918a46a2935ca84031dd91aa
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy.
Publish Date: 2024-04-03
URL: CVE-2024-28219
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.3%
CVSS 3 Score Details (6.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-44wm-f244-xhp3
Release Date: 2024-04-03
Fix Resolution: pillow - 10.3.0