Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:ebuild/dev-python/pillow@10.2.0
purl pkg:ebuild/dev-python/pillow@10.2.0
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-9ckw-ra54-z3b7 Arbitrary Code Execution in Pillow Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter). CVE-2023-50447
GHSA-3f63-hfp8-52jq
VCID-n1hp-atex-ubh4 An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. BIT-pillow-2023-44271
CVE-2023-44271
GHSA-8ghj-p4vj-mr35
PYSEC-2023-227

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:58:48.202011+00:00 Gentoo Importer Fixing VCID-9ckw-ra54-z3b7 https://security.gentoo.org/glsa/202405-12 38.0.0
2026-04-01T12:58:48.192730+00:00 Gentoo Importer Fixing VCID-n1hp-atex-ubh4 https://security.gentoo.org/glsa/202405-12 38.0.0