Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/ - | |
References | () https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow - Release Notes, Vendor Advisory | |
References | () https://pillow.readthedocs.io/en/stable/releasenotes/index.html - Release Notes, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202211-10 - Third Party Advisory |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-13 17:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34552
Mitre link : CVE-2021-34552
CVE.ORG link : CVE-2021-34552
JSON object : View
Products Affected
python
- pillow
fedoraproject
- fedora
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')