CVE-2019-16865
Published: 4 October 2019
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
Priority
Status
Package | Release | Status |
---|---|---|
pillow Launchpad, Ubuntu, Debian |
bionic |
Released
(5.1.0-1ubuntu0.2)
|
disco |
Ignored
(end of life)
|
|
eoan |
Released
(6.1.0-1ubuntu0.2)
|
|
trusty |
Released
(2.3.0-1ubuntu3.4+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(6.2.0-1)
|
|
xenial |
Released
(3.1.2-0ubuntu1.3)
|
|
Patches: upstream: https://github.com/python-pillow/Pillow/commit/b36c1bc943d554ba223086c7efb502d080f73905 upstream: https://github.com/python-pillow/Pillow/commit/f228d0ccbf6bf9392d7fcd51356ef2cfda80c75a upstream: https://github.com/python-pillow/Pillow/commit/b9693a51c99c260bd66d1affeeab4a226cf7e5a5 upstream: https://github.com/python-pillow/Pillow/commit/cc16025e234b7a7a4dd3a86d2fdc0980698db9cc |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |