First published: Thu Apr 01 2021(Updated: )
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.2.0 | |
Fedoraproject Fedora | =33 | |
redhat/python-pillow | <8.2.0 | 8.2.0 |
pip/Pillow | >=2.4.0<8.2.0 | 8.2.0 |
To mitigate this feature on Red Hat Quay keep the invoice generation feature disabled, as it is by default.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-25288 is critical with a CVSS score of 9.1.
To fix CVE-2021-25288, upgrade to version 8.2.0 of Pillow.
The affected software for CVE-2021-25288 includes Python Pillow versions up to and excluding 8.2.0, as well as Red Hat's python-pillow package versions 0:5.1.1-16.el8.
The CWE of CVE-2021-25288 is CWE-125.
Yes, there are references available for CVE-2021-25288. You can find them at the following URLs: [link1], [link2], [link3].