First published: Sun Feb 28 2021(Updated: )
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Pillow | <8.1.1 | |
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
redhat/python-pillow | <8.1.1 | 8.1.1 |
pip/Pillow | >=5.1.0<8.1.1 | 8.1.1 |
Disable the invoice generation feature to mitigate this vulnerability in Red Hat Quay.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-25292.
The severity level of CVE-2021-25292 is high (7).
The affected software versions are Python Pillow versions up to (but not including) 8.1.1.
You can fix CVE-2021-25292 by updating to Python Pillow version 8.1.1 or later.
A regular expression denial of service (ReDoS) attack is a type of input validation vulnerability that can cause the application to become unresponsive or consume excessive resources when processing certain maliciously crafted input.