An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
access.redhat.com/errata/RHSA-2020:0566
access.redhat.com/errata/RHSA-2020:0578
access.redhat.com/errata/RHSA-2020:0580
access.redhat.com/errata/RHSA-2020:0681
access.redhat.com/errata/RHSA-2020:0683
access.redhat.com/errata/RHSA-2020:0694
github.com/python-pillow/Pillow
github.com/python-pillow/Pillow/commit/ab52630d0644e42a75eb88b78b9a9d7438a6fbeb
github.com/python-pillow/Pillow/issues/4123
lists.fedoraproject.org/archives/list/[email protected]/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU
lists.fedoraproject.org/archives/list/[email protected]/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3
nvd.nist.gov/vuln/detail/CVE-2019-16865
pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html
ubuntu.com/security/notices/USN-4272-1
usn.ubuntu.com/4272-1
www.debian.org/security/2020/dsa-4631