9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.4%
The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25287)
python-pillow: Out-of-bounds read in J2K image reader (CVE-2021-25288)
python-pillow: Negative-offset memcpy in TIFF image reader (CVE-2021-25290)
python-pillow: Regular expression DoS in PDF format parser (CVE-2021-25292)
python-pillow: Out-of-bounds read in SGI RLE image reader (CVE-2021-25293)
python-pillow: Excessive memory allocation in BLP image reader (CVE-2021-27921)
python-pillow: Excessive memory allocation in ICNS image reader (CVE-2021-27922)
python-pillow: Excessive memory allocation in ICO image reader (CVE-2021-27923)
python-pillow: Excessive memory allocation in PSD image reader (CVE-2021-28675)
python-pillow: Infinite loop in FLI image reader (CVE-2021-28676)
python-pillow: Excessive CPU use in EPS image reader (CVE-2021-28677)
python-pillow: Excessive looping in BLP image reader (CVE-2021-28678)
python-pillow: Buffer overflow in image convert function (CVE-2021-34552)
python-pillow: Buffer over-read in PCX image reader (CVE-2020-35653)
python-pillow: Buffer over-read in SGI RLE image reader (CVE-2020-35655)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1915420
bugzilla.redhat.com/show_bug.cgi?id=1915432
bugzilla.redhat.com/show_bug.cgi?id=1934685
bugzilla.redhat.com/show_bug.cgi?id=1934699
bugzilla.redhat.com/show_bug.cgi?id=1934705
bugzilla.redhat.com/show_bug.cgi?id=1935384
bugzilla.redhat.com/show_bug.cgi?id=1935396
bugzilla.redhat.com/show_bug.cgi?id=1935401
bugzilla.redhat.com/show_bug.cgi?id=1958226
bugzilla.redhat.com/show_bug.cgi?id=1958231
bugzilla.redhat.com/show_bug.cgi?id=1958240
bugzilla.redhat.com/show_bug.cgi?id=1958252
bugzilla.redhat.com/show_bug.cgi?id=1958257
bugzilla.redhat.com/show_bug.cgi?id=1958263
bugzilla.redhat.com/show_bug.cgi?id=1982378
errata.rockylinux.org/RLSA-2021:4149
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.4%