CVE-2021-28677
Publication date 10 May 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
Status
Package | Ubuntu Release | Status |
---|---|---|
pillow | 24.10 oracular |
Fixed 8.1.2+dfsg-0.1ubuntu1
|
24.04 LTS noble |
Fixed 8.1.2+dfsg-0.1ubuntu1
|
|
22.04 LTS jammy |
Fixed 8.1.2+dfsg-0.1ubuntu1
|
|
20.04 LTS focal |
Fixed 7.0.0-4ubuntu0.4
|
|
18.04 LTS bionic |
Fixed 5.1.0-1ubuntu0.6
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of ESM support, was needs-triage | |
pillow-python2 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
python-imaging | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4963-1
- Pillow vulnerabilities
- 19 May 2021