The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
References
Link | Resource |
---|---|
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/ | |
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/202211-10 | Third Party Advisory |
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443 | Exploit Patch Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-09-03 16:15
Updated : 2024-03-22 11:15
NVD link : CVE-2021-23437
Mitre link : CVE-2021-23437
CVE.ORG link : CVE-2021-23437
JSON object : View
Products Affected
python
- pillow
fedoraproject
- fedora
CWE
CWE-125
Out-of-bounds Read