First published: Tue Nov 09 2021(Updated: )
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.<br>Security Fix(es):<br><li> python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25287)</li> <li> python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25288)</li> <li> python-pillow: Negative-offset memcpy in TIFF image reader (CVE-2021-25290)</li> <li> python-pillow: Regular expression DoS in PDF format parser (CVE-2021-25292)</li> <li> python-pillow: Out-of-bounds read in SGI RLE image reader (CVE-2021-25293)</li> <li> python-pillow: Excessive memory allocation in BLP image reader (CVE-2021-27921)</li> <li> python-pillow: Excessive memory allocation in ICNS image reader (CVE-2021-27922)</li> <li> python-pillow: Excessive memory allocation in ICO image reader (CVE-2021-27923)</li> <li> python-pillow: Excessive memory allocation in PSD image reader (CVE-2021-28675)</li> <li> python-pillow: Infinite loop in FLI image reader (CVE-2021-28676)</li> <li> python-pillow: Excessive CPU use in EPS image reader (CVE-2021-28677)</li> <li> python-pillow: Excessive looping in BLP image reader (CVE-2021-28678)</li> <li> python-pillow: Buffer overflow in image convert function (CVE-2021-34552)</li> <li> python-pillow: Buffer over-read in PCX image reader (CVE-2020-35653)</li> <li> python-pillow: Buffer over-read in SGI RLE image reader (CVE-2020-35655)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pillow | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debugsource | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-tk-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debugsource | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-tk-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debugsource | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python3-pillow-tk-debuginfo | <5.1.1-16.el8 | 5.1.1-16.el8 |
redhat/python-pillow-debuginfo | <5.1.1-16.el8.aa | 5.1.1-16.el8.aa |
redhat/python-pillow-debugsource | <5.1.1-16.el8.aa | 5.1.1-16.el8.aa |
redhat/python3-pillow | <5.1.1-16.el8.aa | 5.1.1-16.el8.aa |
redhat/python3-pillow-debuginfo | <5.1.1-16.el8.aa | 5.1.1-16.el8.aa |
redhat/python3-pillow-tk-debuginfo | <5.1.1-16.el8.aa | 5.1.1-16.el8.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.