CVE-2021-34552: Buffer Overflow in Pillow
(updated )
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References
- github.com/advisories/GHSA-7534-mm45-c74v
- github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml
- github.com/python-pillow/Pillow
- github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f
- github.com/python-pillow/Pillow/pull/5567
- lists.debian.org/debian-lts-announce/2021/07/msg00018.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ
- nvd.nist.gov/vuln/detail/CVE-2021-34552
- pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html
- pillow.readthedocs.io/en/stable/releasenotes/index.html
- security.gentoo.org/glsa/202211-10
Detect and mitigate CVE-2021-34552 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →