First published: Wed Mar 03 2021(Updated: )
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.1.1 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/python-pillow | <8.1.2 | 8.1.2 |
pip/Pillow | <8.1.1 | 8.1.1 |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27922 is a vulnerability found in python-pillow that allows attackers to cause a denial of service due to improper checking of the reported size of an ICNS container, resulting in large memory allocation.
CVE-2021-27922 can cause a denial of service by consuming excessive memory in the affected software.
CVE-2021-27922 has a severity rating of 7.5 out of 10, indicating a high severity.
To fix CVE-2021-27922 in Pillow, update to version 8.1.1 or later.
You can find more information about CVE-2021-27922 at the following references: - [CVE Record](https://www.cve.org/CVERecord?id=CVE-2021-27922) - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-27922) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1935396) - [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2021:4149)