Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Apr 3, 2024
1 parent 266e282 commit b4a48e8
Show file tree
Hide file tree
Showing 2 changed files with 41 additions and 8 deletions.
@@ -1,11 +1,12 @@
{
"schema_version": "1.4.0",
"id": "GHSA-44wm-f244-xhp3",
"modified": "2024-04-03T03:30:30Z",
"modified": "2024-04-03T14:53:39Z",
"published": "2024-04-03T03:30:30Z",
"aliases": [
"CVE-2024-28219"
],
"summary": "Pillow buffer overflow vulnerability",
"details": "In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy.",
"severity": [
{
Expand All @@ -14,25 +15,52 @@
}
],
"affected": [

{
"package": {
"ecosystem": "PyPI",
"name": "pillow"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "10.3.0"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28219"
},
{
"type": "WEB",
"url": "https://github.com/python-pillow/Pillow/commit/2a93aba5cfcf6e241ab4f9392c13e3b74032c061"
},
{
"type": "PACKAGE",
"url": "https://github.com/python-pillow/Pillow"
},
{
"type": "WEB",
"url": "https://pillow.readthedocs.io/en/stable/releasenotes/10.3.0.html#security"
}
],
"database_specific": {
"cwe_ids": [

"CWE-120",
"CWE-676"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"github_reviewed": true,
"github_reviewed_at": "2024-04-03T14:53:39Z",
"nvd_published_at": "2024-04-03T03:15:09Z"
}
}
@@ -1,13 +1,14 @@
{
"schema_version": "1.4.0",
"id": "GHSA-r65j-6h5f-4f92",
"modified": "2024-04-01T23:02:54Z",
"modified": "2024-04-03T14:52:58Z",
"published": "2024-04-01T03:30:38Z",
"withdrawn": "2024-04-03T14:52:58Z",
"aliases": [
"CVE-2024-31033"
],
"summary": "JJWT improperly generates signing keys",
"details": "JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class.",
"summary": "Withdrawn: JJWT improperly generates signing keys",
"details": "## Withdrawn Advisory\n\nThis advisory has been withdrawn because it has been found to be disputed. Please see the issue [here](https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358) for more information.\n\n## Original Description\n\nJJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class.",
"severity": [
{
"type": "CVSS_V3",
Expand Down Expand Up @@ -40,6 +41,10 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31033"
},
{
"type": "WEB",
"url": "https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358"
},
{
"type": "WEB",
"url": "https://github.com/2308652512/JJWT_BUG"
Expand Down

0 comments on commit b4a48e8

Please sign in to comment.