
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds read vulnerability (CVE-2021-25293) was discovered in Pillow, a Python imaging library, affecting versions before 8.1.1. The vulnerability was specifically identified in the SGIRleDecode.c component and has been present since Pillow version 4.3.0 (Debian Tracker, Pillow Docs).
The vulnerability is classified as an out-of-bounds read issue in the SGIRleDecode.c component of Pillow. The issue was introduced in version 4.3.0 and affects all versions up to 8.1.1. The vulnerability was assigned a CVSS 3 Severity Score of 7.5 (High) (Ubuntu Security).
The vulnerability could potentially lead to unauthorized access to memory contents through out-of-bounds read operations when processing SGI RLE images (CVE Mitre).
The vulnerability has been fixed in Pillow version 8.1.1 and later releases. Users are advised to upgrade to the patched version. For Gentoo users, the recommendation is to upgrade to version 8.2.0 or later using the command: emerge --ask --oneshot --verbose ">=dev-python/pillow-8.2.0" (Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."