Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
{ "nvd_published_at": "2021-07-13T17:15:00Z", "cwe_ids": [ "CWE-120" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-10-05T18:52:50Z" }