Description
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
References (6)
Core 6
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202211-10
Release Notes, Vendor Advisory
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
Release Notes, Vendor Advisory
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
Scores
CVSS v3
9.8
EPSS
0.0034
EPSS Percentile
56.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (5)
debian/debian_linux
9.0
fedoraproject/fedora
33
fedoraproject/fedora
34
pypi/pillow
0 - 8.3.0PyPI
python/pillow
1.0 - 1.1.7
Published
Jul 13, 2021
Tracked Since
Feb 18, 2026