Critical Vulnerability in Python-Imageio Addressed by Mageia Advisory
Summary
imageio can attempt to download shared freeimage libraries from https://github.com/imageio/imageio-binaries/tree/master/freeimage. The code fetches straight from master and provides no way of verifying whether the correct file was fetched. As a result, if the repository is attacked in the future, all prior versions of imageio would be silently
References
- https://bugs.mageia.org/show_bug.cgi?id=31016
Resolution
MGASA-2024-0244 - Updated python-imageio packages fix security vulnerability
SRPMS
- 9/core/python-imageio-2.22.4-1.1.mga9