CVE-2022-30595 – pillow
Package
Manager: pip
Name: pillow
Vulnerable Version: =9.1.0 || >=9.1.0 <9.1.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03569 pctl0.87264
Details
Buffer over-flow in Pillow When reading a TGA file with RLE packets that cross scan lines, Pillow reads the information past the end of the first line without deducting that from the length of the remaining file data. This vulnerability was introduced in Pillow 9.1.0, and can cause a heap buffer overflow. Opening an image with a zero or negative height has been found to bypass a decompression bomb check. This will now raise a SyntaxError instead, in turn raising a PIL.UnidentifiedImageError.
Metadata
Created: 2022-05-26T00:01:27Z
Modified: 2024-11-26T18:40:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hr8g-f6r6-mr22/GHSA-hr8g-f6r6-mr22.json
CWE IDs: ["CWE-120"]
Alternative ID: GHSA-hr8g-f6r6-mr22
Finding: F316
Auto approve: 1