You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
mend-bolt-for-githubbot
changed the title
CVE-2021-27923 (Medium) detected in Pillow-3.2.0.tar.gz
CVE-2021-27923 (High) detected in Pillow-3.2.0.tar.gz
Mar 24, 2021
CVE-2021-27923 - High Severity Vulnerability
Vulnerable Library - Pillow-3.2.0.tar.gz
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/e2/af/0a3981fffc5cd43078eb8b1057702e0dd2d5771e5aaa36cbd140e32f8473/Pillow-3.2.0.tar.gz
Path to dependency file: example-pip-travis/requirements.txt
Path to vulnerable library: example-pip-travis/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 2e6ea8c3dcb1b55f578af576c612e93082db2c8f
Vulnerability Details
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
Publish Date: 2021-03-03
URL: CVE-2021-27923
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://pillow.readthedocs.io/en/stable/releasenotes/8.1.2.html
Release Date: 2021-03-03
Fix Resolution: Pillow - 8.1.2
The text was updated successfully, but these errors were encountered: