Bug 1935384 (CVE-2021-27921)
Summary: | CVE-2021-27921 python-pillow: Excessive memory allocation in BLP image reader | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bdettelb, cstratak, kaycoth, lbalhar, manisandro, miminar, orion, paul, python-maint, rhel8-maint, rschiron, tomckay, torsava |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | python-pillow 8.1.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in python-pillow. Attackers can cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-19 14:09:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1935385, 1935386, 1935387, 1935388, 1935584, 1939594, 1939595 | ||
Bug Blocks: | 1934710 |
Description
Guilherme de Almeida Suckevicz
2021-03-04 19:26:20 UTC
Created mingw-python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1935388] Created python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1935385] Created python2-pillow tracking bugs for this issue: Affects: fedora-all [bug 1935386] Created python3-pillow tracking bugs for this issue: Affects: epel-7 [bug 1935387] Mitigation: Disable the invoice generation feature to mitigate this vulnerability in Red Hat Quay. Upstream patch seems to be https://github.com/python-pillow/Pillow/commit/480f6819b592d7f07b9a9a52a7656c10bbe07442 CVEs 2021-27921, 27922, and 27923 share the same fix but upstream has only ICNS file in the tests to check it. Do you plan to create also BLP and ICO files to test all three possible variants of the issue? This issue has been addressed in the following products: Red Hat Quay 3 Via RHSA-2021:3917 https://access.redhat.com/errata/RHSA-2021:3917 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-27921 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4149 https://access.redhat.com/errata/RHSA-2021:4149 |