Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
{
"versions": [
{
"introduced": "1.2"
},
{
"last_affected": "8.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}[
{
"events": [
{
"introduced": "1.0"
},
{
"last_affected": "1.1.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-34552.json"