{"id":"CVE-2021-34552","details":"Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.","aliases":["BIT-pillow-2021-34552","GHSA-7534-mm45-c74v","PYSEC-2021-331"],"modified":"2026-04-16T04:31:28.885265775Z","published":"2021-07-13T17:15:09.400Z","related":["ALSA-2021:4149","SUSE-SU-2021:2595-1","SUSE-SU-2021:2631-1","SUSE-SU-2021:2632-1","SUSE-SU-2024:1673-1","SUSE-SU-2024:1673-2","openSUSE-SU-2021:1134-1","openSUSE-SU-2024:11209-1","openSUSE-SU-2024:13827-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"},{"type":"ADVISORY","url":"https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow"},{"type":"ADVISORY","url":"https://pillow.readthedocs.io/en/stable/releasenotes/index.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202211-10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-pillow/pillow","events":[{"introduced":"fb47c498ef1bed2fd5e8bf5c84427bd7ab410da5"},{"last_affected":"e0e353c0ef7516979a9aedce3792596649ce4433"},{"introduced":"0"},{"last_affected":"82541b6dec8452cb612067fcebba1c5a1a2bfdc8"}],"database_specific":{"versions":[{"introduced":"1.2"},{"last_affected":"8.2.0"},{"introduced":"0"},{"last_affected":"9.0"}]}}],"versions":["1.2","1.7.7","1.7.8","2.0.0","2.1.0","2.2.0","2.2.1","2.3.0","2.5.0","2.7.0","2.8.0","2.8.1","2.9.0","2.9.0.dev0","2.9.0.dev1","2.9.0.dev2","3.1.0","3.1.0-rc1","3.2.0","3.3.0","3.4.0","4.0.0","4.0.0a","4.1.0","4.2.0","4.3.0","5.0.0","5.1.0","5.2.0","5.3.0","5.4.0","6.0.0","6.1.0","6.2.0","7.0.0","7.1.0","7.2.0","8.0.0","8.1.0","8.2.0","8.3.0","8.4.0","9.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"1.0"},{"last_affected":"1.1.7"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-34552.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}