First published: Thu Apr 01 2021(Updated: )
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | <8.2.0 | |
Fedoraproject Fedora | =33 | |
pip/Pillow | >=5.1.0<8.2.0 | 8.2.0 |
To mitigate this feature on Red Hat Quay keep the invoice generation feature disabled, as it is by default.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28678 is a vulnerability found in the python-pillow library, allowing for a Denial of Service (DoS) attack by running the decoder on empty data.
CVE-2021-28678 has a severity score of 7.5, which is considered high.
To fix CVE-2021-28678, you should update python-pillow to version 8.2.0 or higher.
You can find more information about CVE-2021-28678 in the following references: [https://www.cve.org/CVERecord?id=CVE-2021-28678](https://www.cve.org/CVERecord?id=CVE-2021-28678), [https://nvd.nist.gov/vuln/detail/CVE-2021-28678](https://nvd.nist.gov/vuln/detail/CVE-2021-28678), [https://bugzilla.redhat.com/show_bug.cgi?id=1958263](https://bugzilla.redhat.com/show_bug.cgi?id=1958263), [https://access.redhat.com/errata/RHSA-2021:4149](https://access.redhat.com/errata/RHSA-2021:4149).
CVE-2021-28678 is associated with CWE-20 (Improper Input Validation) and CWE-345 (Insufficient Verification of Data Authenticity).