First published: Fri Jan 03 2020(Updated: )
`libImaging/SgiRleDecode.c` in Pillow before 6.2.2 has an SGI buffer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pillow | <=6.2.1 | 6.2.2 |
redhat/python-pillow | <0:5.1.1-10.el8_1 | 0:5.1.1-10.el8_1 |
redhat/python-pillow | <0:5.1.1-10.el8_0 | 0:5.1.1-10.el8_0 |
Python Pillow | <6.2.2 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
redhat/python-pillow | <6.2.2 | 6.2.2 |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 10.4.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-5311 is a vulnerability in the libImaging/SgiRleDecode.c file in Pillow before version 6.2.2.
CVE-2020-5311 allows an attacker to crash an application or potentially execute code on the system by exploiting an out-of-bounds write flaw in the SGI RLE image decoding process of python-pillow.
CVE-2020-5311 has a severity rating of critical, with a severity value of 9 out of 10.
To fix CVE-2020-5311, ensure you are using python-pillow version 6.2.2 or later.
You can find more information about CVE-2020-5311 in the references provided: [GitHub commit](https://github.com/python-pillow/Pillow/commit/a79b65c47c7dc6fe623aadf09aa6192fc54548f3), [Pillow release notes](https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1789541).