Lucene search

K
osvGoogleOSV:RLSA-2021:4149
HistoryNov 09, 2021 - 8:24 a.m.

Moderate: python-pillow security update

2021-11-0908:24:34
Google
osv.dev
12
python-pillow
image processing
security update
out-of-bounds read
buffer overflow
excessive memory allocation
infinite loop
cve-2021-25287
cve-2021-25288
cve-2021-25290
cve-2021-25292
cve-2021-25293
cve-2021-27921
cve-2021-27922
cve-2021-27923
cve-2021-28675
cve-2021-28676
cve-2021-28677
cve-2021-28678
cve-2021-34552
cve-2020-35653
cve-2020-35655
rocky linux 8.5

AI Score

9.7

Confidence

High

EPSS

0.007

Percentile

80.1%

The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.

Security Fix(es):

  • python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25287)

  • python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25288)

  • python-pillow: Negative-offset memcpy in TIFF image reader (CVE-2021-25290)

  • python-pillow: Regular expression DoS in PDF format parser (CVE-2021-25292)

  • python-pillow: Out-of-bounds read in SGI RLE image reader (CVE-2021-25293)

  • python-pillow: Excessive memory allocation in BLP image reader (CVE-2021-27921)

  • python-pillow: Excessive memory allocation in ICNS image reader (CVE-2021-27922)

  • python-pillow: Excessive memory allocation in ICO image reader (CVE-2021-27923)

  • python-pillow: Excessive memory allocation in PSD image reader (CVE-2021-28675)

  • python-pillow: Infinite loop in FLI image reader (CVE-2021-28676)

  • python-pillow: Excessive CPU use in EPS image reader (CVE-2021-28677)

  • python-pillow: Excessive looping in BLP image reader (CVE-2021-28678)

  • python-pillow: Buffer overflow in image convert function (CVE-2021-34552)

  • python-pillow: Buffer over-read in PCX image reader (CVE-2020-35653)

  • python-pillow: Buffer over-read in SGI RLE image reader (CVE-2020-35655)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.