First published: Thu Apr 01 2021(Updated: )
A flaw was found in python-pillow. The readline used in EPS has to deal with any combination of \r and \n as line endings. It accidentally used a quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a denial-of-service of Pillow in the open phase, before an image was accepted for opening.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.2.0 | |
Fedoraproject Fedora | =33 | |
redhat/python-pillow | <8.2.0 | 8.2.0 |
pip/Pillow | <8.2.0 | 8.2.0 |
To mitigate this feature on Red Hat Quay keep the invoice generation feature disabled, as it is by default.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28677 is a vulnerability found in python-pillow, a library used for handling EPS data.
CVE-2021-28677 has a severity rating of high (7).
CVE-2021-28677 affects python-pillow versions 0:5.1.1-16.el8 up to, but excluding, 8.2.0.
To fix CVE-2021-28677, upgrade python-pillow to version 8.2.0 or higher.
You can find more information about CVE-2021-28677 on CVE.org (https://www.cve.org/CVERecord?id=CVE-2021-28677) and NVD (https://nvd.nist.gov/vuln/detail/CVE-2021-28677).