An update for python-pillow is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1383
Final
1.0
1.0
2021-10-15
Initial
2021-10-15
2021-10-15
openEuler SA Tool V1.0
2021-10-15
python-pillow security update
An update for python-pillow is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
Pillow is the friendly PIL fork by Alex Clark and Contributors. PIL is the Python Imaging Library by Fredrik Lundh and Contributors. As of 2019, Pillow development is supported by Tidelift.
Security Fix(es):
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.(CVE-2021-23437)
An update for python-pillow is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
python-pillow
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1383
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-23437
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
python3-pillow-devel-8.1.1-7.oe1.aarch64.rpm
python-pillow-debuginfo-8.1.1-7.oe1.aarch64.rpm
python-pillow-debugsource-8.1.1-7.oe1.aarch64.rpm
python3-pillow-qt-8.1.1-7.oe1.aarch64.rpm
python3-pillow-8.1.1-7.oe1.aarch64.rpm
python3-pillow-tk-8.1.1-7.oe1.aarch64.rpm
python3-pillow-8.1.1-7.oe1.aarch64.rpm
python-pillow-debuginfo-8.1.1-7.oe1.aarch64.rpm
python-pillow-debugsource-8.1.1-7.oe1.aarch64.rpm
python3-pillow-devel-8.1.1-7.oe1.aarch64.rpm
python3-pillow-tk-8.1.1-7.oe1.aarch64.rpm
python3-pillow-qt-8.1.1-7.oe1.aarch64.rpm
python3-pillow-help-8.1.1-7.oe1.noarch.rpm
python3-pillow-help-8.1.1-7.oe1.noarch.rpm
python-pillow-8.1.1-7.oe1.src.rpm
python-pillow-8.1.1-7.oe1.src.rpm
python3-pillow-tk-8.1.1-7.oe1.x86_64.rpm
python-pillow-debugsource-8.1.1-7.oe1.x86_64.rpm
python3-pillow-qt-8.1.1-7.oe1.x86_64.rpm
python3-pillow-8.1.1-7.oe1.x86_64.rpm
python-pillow-debuginfo-8.1.1-7.oe1.x86_64.rpm
python3-pillow-devel-8.1.1-7.oe1.x86_64.rpm
python-pillow-debuginfo-8.1.1-7.oe1.x86_64.rpm
python3-pillow-devel-8.1.1-7.oe1.x86_64.rpm
python3-pillow-qt-8.1.1-7.oe1.x86_64.rpm
python3-pillow-tk-8.1.1-7.oe1.x86_64.rpm
python-pillow-debugsource-8.1.1-7.oe1.x86_64.rpm
python3-pillow-8.1.1-7.oe1.x86_64.rpm
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
2021-10-15
CVE-2021-23437
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
python-pillow security update
2021-10-15
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1383