First published: Sun Jan 03 2021(Updated: )
A flaw was found in python-pillow. The PcxDecode in Pillow has a buffer over-read when decoding a crafted PCX file due to the user-supplied stride value trusted for buffer calculations. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.1.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
redhat/python-pillow | <8.1.0 | 8.1.0 |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 | |
pip/pillow | >=0<8.1.0 | 8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in python-pillow is CVE-2020-35653.
CVE-2020-35653 has a severity level of high.
The highest threat from CVE-2020-35653 is to system availability.
Versions up to and excluding 8.1.0 of python-pillow are affected by CVE-2020-35653.
To fix CVE-2020-35653, you need to update python-pillow to version 8.1.0 or later.