Search for packages
| purl | pkg:ebuild/dev-python/pillow@10.2.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-9ckw-ra54-z3b7 | Arbitrary Code Execution in Pillow Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter). |
CVE-2023-50447
GHSA-3f63-hfp8-52jq |
| VCID-n1hp-atex-ubh4 | An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. |
BIT-pillow-2023-44271
CVE-2023-44271 GHSA-8ghj-p4vj-mr35 PYSEC-2023-227 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:58:48.202011+00:00 | Gentoo Importer | Fixing | VCID-9ckw-ra54-z3b7 | https://security.gentoo.org/glsa/202405-12 | 38.0.0 |
| 2026-04-01T12:58:48.192730+00:00 | Gentoo Importer | Fixing | VCID-n1hp-atex-ubh4 | https://security.gentoo.org/glsa/202405-12 | 38.0.0 |