9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.4%
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25287)
python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25288)
python-pillow: Negative-offset memcpy in TIFF image reader (CVE-2021-25290)
python-pillow: Regular expression DoS in PDF format parser (CVE-2021-25292)
python-pillow: Out-of-bounds read in SGI RLE image reader (CVE-2021-25293)
python-pillow: Excessive memory allocation in BLP image reader (CVE-2021-27921)
python-pillow: Excessive memory allocation in ICNS image reader (CVE-2021-27922)
python-pillow: Excessive memory allocation in ICO image reader (CVE-2021-27923)
python-pillow: Excessive memory allocation in PSD image reader (CVE-2021-28675)
python-pillow: Infinite loop in FLI image reader (CVE-2021-28676)
python-pillow: Excessive CPU use in EPS image reader (CVE-2021-28677)
python-pillow: Excessive looping in BLP image reader (CVE-2021-28678)
python-pillow: Buffer overflow in image convert function (CVE-2021-34552)
python-pillow: Buffer over-read in PCX image reader (CVE-2020-35653)
python-pillow: Buffer over-read in SGI RLE image reader (CVE-2020-35655)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | x86_64 | python3-pillow | < 5.1.1-16.el8 | python3-pillow-5.1.1-16.el8.x86_64.rpm |
vulners.com/cve/CVE-2020-35653
vulners.com/cve/CVE-2020-35655
vulners.com/cve/CVE-2021-25287
vulners.com/cve/CVE-2021-25288
vulners.com/cve/CVE-2021-25290
vulners.com/cve/CVE-2021-25292
vulners.com/cve/CVE-2021-25293
vulners.com/cve/CVE-2021-27921
vulners.com/cve/CVE-2021-27922
vulners.com/cve/CVE-2021-27923
vulners.com/cve/CVE-2021-28675
vulners.com/cve/CVE-2021-28676
vulners.com/cve/CVE-2021-28677
vulners.com/cve/CVE-2021-28678
vulners.com/cve/CVE-2021-34552
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.4%