Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References
| Link | Resource |
|---|---|
| https://pillow.readthedocs.io/en/stable/releasenotes/index.html | Release Notes Vendor Advisory |
| https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow | Release Notes Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-07-13 17:15
Updated : 2021-09-20 12:20
NVD link : CVE-2021-34552
Mitre link : CVE-2021-34552
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
python
- pillow
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
