Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/ | |
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow | Release Notes Vendor Advisory |
https://pillow.readthedocs.io/en/stable/releasenotes/index.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/202211-10 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-07-13 17:15
Updated : 2023-11-07 03:36
NVD link : CVE-2021-34552
Mitre link : CVE-2021-34552
CVE.ORG link : CVE-2021-34552
JSON object : View
Products Affected
python
- pillow
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')