First published: Fri Jan 03 2020(Updated: )
A denial of service vulnerability was found in Pillow in versions before 6.2.2, where the FpxImagePlugin.py file calls the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows systems running 32-bit Python, this flaw results in an OverflowError or MemoryError due to the 2 GB limit. On Linux systems running 64-bit Python, this flaw results in the termination of the process by the out-of-memory (OOM) killer. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Pillow | <6.2.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
redhat/python-pillow | <6.2.2 | 6.2.2 |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 | |
pip/pillow | >=0<6.2.2 | 6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-19911.
CVE-2019-19911 has a severity value of 7.5, which is considered high.
CVE-2019-19911 affects versions of Pillow before 6.2.2.
To fix CVE-2019-19911, you should update Pillow to version 6.2.2 or later.
You can find more information about CVE-2019-19911 at the following references: [CVE-2019-19911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911), [Pillow Release Notes](https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html), [Ubuntu Security Notice](https://ubuntu.com/security/notices/USN-4272-1).