Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerabilidade Buffer Overflow #62

Open
vinisec opened this issue Oct 14, 2021 · 0 comments
Open

Vulnerabilidade Buffer Overflow #62

vinisec opened this issue Oct 14, 2021 · 0 comments
Labels

Comments

@vinisec
Copy link

vinisec commented Oct 14, 2021

Descreva a vulnerabilidade de segurança (se houver CVE, coloque como
referência)

CVE-2021-34552

Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.

References
https://nvd.nist.gov/vuln/detail/CVE-2021-34552
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html

Classifique a prioridade de correção, de acordo com a severidade da
vulnerabilidade
30 dias

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant