CVE-2021-34552

NameCVE-2021-34552
DescriptionPillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2716-1
Debian Bugs991293

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pillow (PTS)buster5.4.1-2+deb10u3fixed
buster (security)5.4.1-2+deb10u6fixed
bullseye8.1.2+dfsg-0.3+deb11u1fixed
bullseye (security)8.1.2+dfsg-0.3+deb11u2fixed
bookworm9.4.0-1.1fixed
bookworm (security)9.4.0-1.1+deb12u1fixed
sid, trixie10.3.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pillowsourcestretch4.0.0-4+deb9u3DLA-2716-1
pillowsourcebuster5.4.1-2+deb10u3
pillowsource(unstable)8.1.2+dfsg-0.3991293

Notes

https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://github.com/python-pillow/Pillow/pull/5567
https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f (8.3.0)

Search for package or bug name: Reporting problems