An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html | release notes vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU/ | vendor advisory |
https://usn.ubuntu.com/4272-1/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0566 | vendor advisory |
https://www.debian.org/security/2020/dsa-4631 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0580 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0578 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0681 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0683 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0694 | vendor advisory |