Safety vulnerability ID: 40965
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Pillow 8.3.0 includes a fix for CVE-2021-34552: Pillow through 8.2.0 and PIL (also known as Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
Latest version: 11.0.0
Python Imaging Library (Fork)
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. See CVE-2021-34552.
MISC:https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow: https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
MISC:https://pillow.readthedocs.io/en/stable/releasenotes/index.html: https://pillow.readthedocs.io/en/stable/releasenotes/index.html
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application