First published: Tue Jul 13 2021(Updated: )
A flaw was found in python-pillow. This flaw allows an attacker to pass controlled parameters directly into a convert function, triggering a buffer overflow in the "convert()" or "ImagingConvertTransparent()" functions in Convert.c. The highest threat to this vulnerability is to system availability. In Red Hat Quay, a vulnerable version of python-pillow is shipped with quay-registry-container, however the invoice generation feature which uses python-pillow is disabled by default. Therefore impact has been rated Moderate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <0:5.1.1-16.el8 | 0:5.1.1-16.el8 |
Python Pillow | >=1.0<=1.1.7 | |
Python Pillow | >=1.2<=8.2.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/python-pillow | <8.3.0 | 8.3.0 |
pip/pillow | <8.3.0 | 8.3.0 |
>=1.0<=1.1.7 | ||
>=1.2<=8.2.0 | ||
=9.0 | ||
=33 | ||
=34 |
To mitigate this flaw on Red Hat Quay, keep the invoice generation feature disabled, as it is by default. Red Hat Satellite 6.9 customers can apply following hotfix to eliminate the vulnerability warnings. * Download python2-daemon-2.1.2-7.1.HFRHBZ1998199.el7sat.noarch.rpm from https://bugzilla.redhat.com/attachment.cgi?id=1819471 * Stop services: # satellite-maintain service stop * Upgrade python2-daemon and remove affected package # rpm -Uvh python2-daemon-2.1.2-7.1.HFRHBZ1998199.el7sat.noarch.rpm # yum remove python-pillow * Restart services: # satellite-maintain service start Satellite 6.10 future release is also fixing this.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in python-pillow is CVE-2021-34552.
The severity rating of CVE-2021-34552 is medium with a score of 5.9.
The "convert()" and "ImagingConvertTransparent()" functions in Convert.c are affected by CVE-2021-34552.
The impacted software is python-pillow versions 0:5.1.1-16.el8 and versions up to, but excluding, 8.3.0.
You can find more information about CVE-2021-34552 at the following references: [CVE-2021-34552](https://www.cve.org/CVERecord?id=CVE-2021-34552), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-34552), [Pillow Release Notes](https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow), [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1982378), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:4149).