Source: pillow
Version: 8.1.2+dfsg-0.2
Severity: grave
Tags: security
Justification: user security hole

https://security-tracker.debian.org/tracker/CVE-2021-34552

Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow 
an attacker to
pass controlled parameters directly into a convert function to trigger a buffer 
overflow in Convert.c.

This has been fixed upstream in version 8.3. The upstream fix can be
backported to 8.1 in unstable.

This is a tracking bug to ease migration of pillow into bullseye. 

I have an upload ready for unstable.

--

Neil Williams

Reply via email to