{"id":"CVE-2023-44271","details":"An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.","aliases":["BIT-pillow-2023-44271","GHSA-8ghj-p4vj-mr35","PYSEC-2023-227"],"modified":"2026-04-09T09:44:55.027917Z","published":"2023-11-03T05:15:30.137Z","related":["ALSA-2024:3005","MGASA-2024-0133","SUSE-SU-2023:4465-1","SUSE-SU-2023:4528-1","SUSE-SU-2023:4630-1","SUSE-SU-2023:4631-1","openSUSE-SU-2024:13439-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4/"},{"type":"ADVISORY","url":"https://devhub.checkmarx.com/cve-details/CVE-2023-44271/"},{"type":"FIX","url":"https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7"},{"type":"FIX","url":"https://github.com/python-pillow/Pillow/pull/7244"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-pillow/pillow","events":[{"introduced":"0"},{"fixed":"6e28ed1f36d0eb74053af54e1eddc9c29db698cd"},{"fixed":"1fe1bb49c452b0318cad12ea9d97c3bef188e9a7"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"10.0.0"}]}}],"versions":["1.0","1.2","1.7.7","1.7.8","2.0.0","2.1.0","2.2.0","2.2.1","2.3.0","2.5.0","2.7.0","2.8.0","2.8.1","2.9.0","2.9.0.dev0","2.9.0.dev1","2.9.0.dev2","3.1.0","3.1.0-rc1","3.2.0","3.3.0","3.4.0","4.0.0","4.0.0a","4.1.0","4.2.0","4.3.0","5.0.0","5.1.0","5.2.0","5.3.0","5.4.0","6.0.0","6.1.0","6.2.0","7.0.0","7.1.0","7.2.0","8.0.0","8.1.0","8.2.0","8.3.0","8.4.0","9.0.0","9.1.0","9.2.0","9.3.0","9.4.0","9.5.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-44271.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}