Bugzilla – Bug 1185785
VUL-0: CVE-2021-28677: python-Pillow: DoS in the open phase via a malicious EPS file
Last modified: 2024-05-14 11:54:18 UTC
CVE-2021-28677 The readline used in EPS has to deal with any combination of \r and \n as line endings. It accidentally used a quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a denial-of-service of Pillow in the open phase, before an image was accepted for opening. This dates to the PIL fork. References: https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#security https://github.com/python-pillow/Pillow/pull/5377 References: https://bugzilla.redhat.com/show_bug.cgi?id=1958257 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28677
closing since no package is affected
Re-open because the following packages are actually affected: - SUSE:SLE-12-SP2:Update:Products:Cloud7:Update/python-Pillow 2.8.1 - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update/python-Pillow 4.2.1 - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update/python-Pillow 5.2.0 Upstream patch [0]. [0] https://github.com/python-pillow/Pillow/commit/5a5e6db0abf4e7a638fb1b3408c4e495a096cb92.patch
SUSE-SU-2021:1938-1: An update that fixes 14 vulnerabilities is now available. Category: security (important) Bug References: 1180832,1180834,1183101,1183102,1183105,1183107,1183108,1183110,1185784,1185785,1185786,1185803,1185804,1185805 CVE References: CVE-2020-35653,CVE-2020-35655,CVE-2021-25287,CVE-2021-25288,CVE-2021-25290,CVE-2021-25292,CVE-2021-25293,CVE-2021-27921,CVE-2021-27922,CVE-2021-27923,CVE-2021-28675,CVE-2021-28676,CVE-2021-28677,CVE-2021-28678 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): python-Pillow-5.2.0-3.8.1 SUSE OpenStack Cloud 9 (src): python-Pillow-5.2.0-3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:1939-1: An update that fixes 10 vulnerabilities is now available. Category: security (important) Bug References: 1180834,1183101,1183105,1183107,1183108,1185785,1185786,1185803,1185804,1185805 CVE References: CVE-2020-35653,CVE-2021-25287,CVE-2021-25288,CVE-2021-25290,CVE-2021-25292,CVE-2021-27922,CVE-2021-27923,CVE-2021-28675,CVE-2021-28676,CVE-2021-28677 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 8 (src): python-Pillow-4.2.1-3.14.1 SUSE OpenStack Cloud 8 (src): python-Pillow-4.2.1-3.14.1 HPE Helion Openstack 8 (src): python-Pillow-4.2.1-3.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:1940-1: An update that fixes 9 vulnerabilities is now available. Category: security (important) Bug References: 1180834,1183105,1183107,1183108,1185785,1185786,1185803,1185804,1185805 CVE References: CVE-2020-35653,CVE-2021-25287,CVE-2021-25288,CVE-2021-25290,CVE-2021-27922,CVE-2021-27923,CVE-2021-28675,CVE-2021-28676,CVE-2021-28677 JIRA References: Sources used: SUSE OpenStack Cloud 7 (src): python-Pillow-2.8.1-4.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
fixes for affected SOC versions released, back to security team.
SUSE-SU-2024:1607-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1185784, 1185785, 1185786, 1185803, 1185804, 1185805 CVE References: CVE-2021-25287, CVE-2021-25288, CVE-2021-28675, CVE-2021-28676, CVE-2021-28677, CVE-2021-28678 Maintenance Incident: [SUSE:Maintenance:33801](https://smelt.suse.de/incident/33801/) Sources used: openSUSE Leap 15.3 (src): python-Pillow-7.2.0-150300.3.12.1 openSUSE Leap 15.5 (src): python-Pillow-7.2.0-150300.3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.