Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
https://security.gentoo.org/glsa/202211-10
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html