First published: Fri Oct 04 2019(Updated: )
A flaw was discovered in the way the python-pillow may allocate a large amount of memory or require a long time while processing specially crafted image files, possibly causing a denial of service. Applications that use the library to process untrusted files may be vulnerable to this flaw.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:2.0.0-20.gitd1c6db8.el7_7 | 0:2.0.0-20.gitd1c6db8.el7_7 |
redhat/python-pillow | <0:5.1.1-10.el8_1 | 0:5.1.1-10.el8_1 |
redhat/python-pillow | <0:5.1.1-10.el8_0 | 0:5.1.1-10.el8_0 |
Python Pillow | <6.2.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
redhat/python-pillow | <6.2.0 | 6.2.0 |
pip/pillow | <6.2.0 | 6.2.0 |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this issue is CVE-2019-16865.
The severity of CVE-2019-16865 is high (7 out of 10).
The affected software is python-pillow.
The vulnerability may allow an attacker to allocate a large amount of memory or cause a denial of service by processing specially crafted image files.
To fix CVE-2019-16865, update to version 6.2.0 of python-pillow.