CVE-2021-34552

NameCVE-2021-34552
DescriptionPillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2716-1, ELA-546-1
Debian Bugs991293

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pillow (PTS)jessie, jessie (lts)2.6.1-2+deb8u10fixed
stretch (security)4.0.0-4+deb9u4fixed
stretch (lts), stretch4.0.0-4+deb9u6fixed
buster (security), buster, buster (lts)5.4.1-2+deb10u6fixed
bullseye (security), bullseye8.1.2+dfsg-0.3+deb11u2fixed
bookworm (security), bookworm9.4.0-1.1+deb12u1fixed
sid, trixie10.4.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pillowsourcejessie2.6.1-2+deb8u7ELA-546-1
pillowsourcestretch4.0.0-4+deb9u3DLA-2716-1
pillowsourcebuster5.4.1-2+deb10u3
pillowsource(unstable)8.1.2+dfsg-0.3991293

Notes

https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://github.com/python-pillow/Pillow/pull/5567
https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f (8.3.0)

Search for package or bug name: Reporting problems