Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References
Link | Resource |
---|---|
https://pillow.readthedocs.io/en/stable/releasenotes/index.html | Release Notes Vendor Advisory |
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow | Release Notes Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202211-10 | Third Party Advisory |
Configurations
Information
Published : 2021-07-13 10:15
Updated : 2023-01-31 09:28
NVD link : CVE-2021-34552
Mitre link : CVE-2021-34552
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
python
- pillow
fedoraproject
- fedora