CVE-2021-34552

Name
CVE-2021-34552
Description
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://pillow.readthedocs.io/en/stable/releasenotes/index.html
MISC https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
Mailing List https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:* pillow >= 1.0 <= 1.1.7
cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:* pillow >= 1.2 <= 8.2.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status