First published: Fri Jan 19 2024(Updated: )
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Pillow | <10.2.0 | 10.2.0 |
Python Pillow | <=10.1.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/pillow | <7.0.0-4ubuntu0.8 | 7.0.0-4ubuntu0.8 |
ubuntu/pillow | <9.0.1-1ubuntu0.2 | 9.0.1-1ubuntu0.2 |
ubuntu/pillow | <10.0.0-1ubuntu0.1 | 10.0.0-1ubuntu0.1 |
ubuntu/pillow | <10.2.0-1 | 10.2.0-1 |
debian/pillow | <=5.4.1-2+deb10u3<=8.1.2+dfsg-0.3+deb11u1<=9.4.0-1.1 | 5.4.1-2+deb10u6 10.3.0-2 |
<=10.1.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.