CVE-2019-16865

NameCVE-2019-16865
DescriptionAn issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pillow (PTS)jessie, jessie (lts)2.6.1-2+deb8u10vulnerable
stretch (security)4.0.0-4+deb9u4vulnerable
stretch (lts), stretch4.0.0-4+deb9u6vulnerable
buster (security), buster, buster (lts)5.4.1-2+deb10u6fixed
bullseye (security), bullseye8.1.2+dfsg-0.3+deb11u2fixed
bookworm (security), bookworm9.4.0-1.1+deb12u1fixed
sid, trixie10.4.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pillowsourcebuster5.4.1-2+deb10u1
pillowsource(unstable)6.2.0-1low
python-imagingsource(unstable)(unfixed)

Notes

[stretch] - pillow <ignored> (Minor issue, too intrusive to backport)
[jessie] - pillow <ignored> (Risk of regressions is too high)
https://github.com/python-pillow/Pillow/commit/b36c1bc943d554ba223086c7efb502d080f73905
https://github.com/python-pillow/Pillow/commit/f228d0ccbf6bf9392d7fcd51356ef2cfda80c75a
https://github.com/python-pillow/Pillow/commit/b9693a51c99c260bd66d1affeeab4a226cf7e5a5
https://github.com/python-pillow/Pillow/commit/cc16025e234b7a7a4dd3a86d2fdc0980698db9cc

Search for package or bug name: Reporting problems