CVE-2021-27923
Description
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Pillow before 8.1.2 has a flaw in ICO image processing that can cause excessive memory allocation leading to denial of service.
Vulnerability
Overview
CVE-2021-27923 is a denial of service vulnerability in the Pillow Python imaging library affecting versions prior to 8.1.2. The root cause lies in the ICO container image processing code, where the reported size of a contained image is not properly validated. When an attacker supplies a crafted ICO file with an artificially inflated size value, Pillow attempts to allocate memory proportionate to that reported size, which can lead to an extremely large memory allocation [1][4].
Exploitation
An attacker can exploit this vulnerability by providing a malicious ICO file to an application that uses Pillow to process user-supplied images. No authentication or elevated privileges are required; the attack can be triggered remotely via a network or through any vector that delivers the crafted image to the vulnerable software. The flaw is classified with low attack complexity, meaning no special conditions or specific target configuration are needed to mount the attack [1].
Impact
Successful exploitation results in excessive memory consumption, causing the application or system to become unresponsive or crash. This is a standard denial of service scenario, and the vulnerability does not appear to allow code execution or data exfiltration [1][4].
Mitigation
The issue is fixed in Pillow version 8.1.2 and later. Users should upgrade their Pillow installations to version 8.1.2 or higher. As of the advisory publication date (2021-03-03), there are no known workarounds; upgrading is the recommended mitigation [1][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pillowPyPI | < 8.1.2 | 8.1.2 |
Affected products
12- Pillow/Pillowdescription
- osv-coords11 versionspkg:bitnami/pillowpkg:pypi/pillowpkg:rpm/almalinux/python3-pillowpkg:rpm/opensuse/python-Pillow&distro=openSUSE%20Leap%2015.5pkg:rpm/suse/python-Pillow&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/python-Pillow&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 8.1.1+ 10 more
- (no CPE)range: < 8.1.1
- (no CPE)range: < 8.1.2
- (no CPE)range: < 5.1.1-16.el8
- (no CPE)range: < 7.2.0-150300.3.15.1
- (no CPE)range: < 4.2.1-3.14.1
- (no CPE)range: < 7.2.0-150300.3.15.1
- (no CPE)range: < 2.8.1-4.22.1
- (no CPE)range: < 4.2.1-3.14.1
- (no CPE)range: < 5.2.0-3.8.1
- (no CPE)range: < 4.2.1-3.14.1
- (no CPE)range: < 5.2.0-3.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- github.com/advisories/GHSA-95q3-8gr9-gm8wghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2021-27923ghsaADVISORY
- security.gentoo.org/glsa/202107-33ghsavendor-advisoryWEB
- github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-42.yamlghsaWEB
- github.com/python-pillow/Pillow/commit/756fff33128a0b643d10518a26ad04b726dd8973ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JUghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2MLghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JUghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2MLghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZghsaWEB
- pillow.readthedocs.io/en/stable/releasenotes/8.1.1.htmlghsaWEB
- pillow.readthedocs.io/en/stable/releasenotes/8.1.2.htmlghsaWEB
News mentions
0No linked articles in our index yet.