First published: Wed Mar 03 2021(Updated: )
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Pillow | <8.1.1 | 8.1.1 |
redhat/python-pillow | <8.1.2 | 8.1.2 |
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.1.1 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Disable the invoice generation feature to mitigate this vulnerability in Red Hat Quay.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2021-27923.
CVE-2021-27923 has a severity rating of 7.5 (high).
This vulnerability can be exploited to cause a denial of service by consuming excessive memory.
Versions up to and including Pillow 8.1.1 are affected by CVE-2021-27923.
To fix CVE-2021-27923, update your Python Pillow package to version 8.1.2 or higher.