CVE-2019-16865: DOS attack in Pillow when processing specially crafted image files
(updated )
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
References
- access.redhat.com/errata/RHSA-2020:0566
- access.redhat.com/errata/RHSA-2020:0578
- access.redhat.com/errata/RHSA-2020:0580
- access.redhat.com/errata/RHSA-2020:0681
- access.redhat.com/errata/RHSA-2020:0683
- access.redhat.com/errata/RHSA-2020:0694
- github.com/advisories/GHSA-j7mj-748x-7p78
- github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2019-110.yaml
- github.com/python-pillow/Pillow
- github.com/python-pillow/Pillow/commit/ab52630d0644e42a75eb88b78b9a9d7438a6fbeb
- github.com/python-pillow/Pillow/issues/4123
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3
- nvd.nist.gov/vuln/detail/CVE-2019-16865
- pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html
- ubuntu.com/security/notices/USN-4272-1
- usn.ubuntu.com/4272-1
- www.debian.org/security/2020/dsa-4631
Detect and mitigate CVE-2019-16865 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →