Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
{
"nvd_published_at": "2021-07-13T17:15:00Z",
"severity": "CRITICAL",
"github_reviewed_at": "2021-10-05T18:52:50Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-120"
]
}