The PDF parser has a catastrophic backtracking regex that could be used as a DOS attack. Reference: https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
Created mingw-python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1934702] Created python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1934700] Created python2-pillow tracking bugs for this issue: Affects: fedora-all [bug 1934701] Created python3-pillow tracking bugs for this issue: Affects: epel-7 [bug 1934703]
Mitigation: Disable the invoice generation feature to mitigate this vulnerability in Red Hat Quay.
Upstream patch: https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c
Upstream does not have an example of the crafted pdf file to reproduce the issue. Do you plan to create a reproducer?
See a new upstream test: https://github.com/python-pillow/Pillow/pull/5393/files
This issue has been addressed in the following products: Red Hat Quay 3 Via RHSA-2021:3917 https://access.redhat.com/errata/RHSA-2021:3917
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-25292
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4149 https://access.redhat.com/errata/RHSA-2021:4149