CVE-2021-34552

NameCVE-2021-34552
DescriptionPillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2716-1
NVD severityhigh
Debian Bugs991293

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pillow (PTS)stretch4.0.0-4+deb9u1vulnerable
stretch (security)4.0.0-4+deb9u3fixed
buster5.4.1-2+deb10u2vulnerable
buster (security)5.4.1-2+deb10u1vulnerable
bookworm, bullseye8.1.2+dfsg-0.3fixed
sid8.3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pillowsourcestretch4.0.0-4+deb9u3DLA-2716-1
pillowsource(unstable)8.1.2+dfsg-0.3991293

Notes

[buster] - pillow <no-dsa> (Minor issue, mitigated by FORTIFY_SOURCE)
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://github.com/python-pillow/Pillow/pull/5567
https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f (8.3.0)

Search for package or bug name: Reporting problems