CVE-2020-10378 (Medium) detected in Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl
Closed this issue · 0 comments
CVE-2020-10378 - Medium Severity Vulnerability
Vulnerable Library - Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/12/ad/61f8dfba88c4e56196bf6d056cdbba64dc9c5dfdfbc97d02e6472feed913/Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl
Path to dependency file: RIDE/requirements.txt
Path to vulnerable library: RIDE/requirements.txt,RIDE/src/bin,RIDE
Dependency Hierarchy:
- ❌ Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl (Vulnerable Library)
Found in HEAD commit: b9f34107e37690a635610462bbe3e6c427366c8a
Vulnerability Details
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.
Publish Date: 2020-06-25
URL: CVE-2020-10378
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: python-pillow/Pillow@41b554b
Release Date: 2020-06-25
Fix Resolution: 7.1.0
Step up your Open Source Security Game with WhiteSource here