{"id":"USN-4963-1","summary":"pillow vulnerabilities","details":"It was discovered that Pillow incorrectly handled certain image files. If a\nuser or automated system were tricked into opening a specially-crafted\nfile, a remote attacker could cause Pillow to crash or hand, resulting in a\ndenial of service.\n","modified":"2026-02-10T04:42:12Z","published":"2021-05-19T13:54:25Z","related":["UBUNTU-CVE-2021-25287","UBUNTU-CVE-2021-25288","UBUNTU-CVE-2021-28675","UBUNTU-CVE-2021-28676","UBUNTU-CVE-2021-28677","UBUNTU-CVE-2021-28678"],"upstream":["CVE-2021-25287","CVE-2021-25288","CVE-2021-28675","CVE-2021-28676","CVE-2021-28677","CVE-2021-28678","UBUNTU-CVE-2021-25287","UBUNTU-CVE-2021-25288","UBUNTU-CVE-2021-28675","UBUNTU-CVE-2021-28676","UBUNTU-CVE-2021-28677","UBUNTU-CVE-2021-28678"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4963-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-25287"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-25288"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28675"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28676"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28678"}],"affected":[{"package":{"name":"pillow","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/pillow@5.1.0-1ubuntu0.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.0-1ubuntu0.6"}]}],"versions":["4.1.1-3build2","4.3.0-2ubuntu1","5.0.0-1","5.1.0-1","5.1.0-1ubuntu0.2","5.1.0-1ubuntu0.3","5.1.0-1ubuntu0.4","5.1.0-1ubuntu0.5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.1.0-1ubuntu0.6","binary_name":"python-pil"},{"binary_version":"5.1.0-1ubuntu0.6","binary_name":"python-pil.imagetk"},{"binary_version":"5.1.0-1ubuntu0.6","binary_name":"python3-pil"},{"binary_version":"5.1.0-1ubuntu0.6","binary_name":"python3-pil.imagetk"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4963-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-25287"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-25288"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28675"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28676"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28677"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28678"}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"pillow","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/pillow@7.0.0-4ubuntu0.4?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.0-4ubuntu0.4"}]}],"versions":["6.1.0-1","6.1.0-1build1","6.2.1-2","7.0.0-4","7.0.0-4build1","7.0.0-4ubuntu0.1","7.0.0-4ubuntu0.2","7.0.0-4ubuntu0.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"7.0.0-4ubuntu0.4","binary_name":"python3-pil"},{"binary_version":"7.0.0-4ubuntu0.4","binary_name":"python3-pil.imagetk"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4963-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-25287"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-25288"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28675"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28676"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28677"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-28678"}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}