Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. Reference: https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
Created mingw-python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1982379] Created python-pillow tracking bugs for this issue: Affects: fedora-all [bug 1982380] Created python2-pillow tracking bugs for this issue: Affects: fedora-all [bug 1982381] Created python3-pillow tracking bugs for this issue: Affects: epel-7 [bug 1982382]
I believe the patches are https://github.com/python-pillow/Pillow/commit/518ee3722a99d7f7d890db82a20bd81c1c0327fb and https://github.com/python-pillow/Pillow/commit/5f4504bb03f4edeeef8c2633dc5ba03a4c2a8a97
This issue has been addressed in the following products: Red Hat Quay 3 Via RHSA-2021:3917 https://access.redhat.com/errata/RHSA-2021:3917
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-34552
(Updating satellite hotfix)
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4149 https://access.redhat.com/errata/RHSA-2021:4149