{"schema_version":"1.7.2","id":"OESA-2026-2066","modified":"2026-04-25T05:49:33Z","published":"2026-04-25T05:49:33Z","upstream":["CVE-2026-40192"],"summary":"python-pillow security update","details":"Pillow is the friendly PIL fork by Alex Clark and Contributors. PIL is the Python Imaging \\ Library by Fredrik Lundh and Contributors. As of 2019, Pillow development is supported by Tidelift.    of CVE-2022-22815,CVE-2022-22816)\r\n\r\nSecurity Fix(es):\n\nPillow is a Python imaging library. Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP-compressed data read when decoding a FITS image, making them vulnerable to decompression bomb attacks. A specially crafted FITS file could cause unbounded memory consumption, leading to denial of service (OOM crash or severe performance degradation). If users are unable to immediately upgrade, they should only open specific image formats, excluding FITS, as a workaround.(CVE-2026-40192)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"python-pillow","purl":"pkg:rpm/openEuler/python-pillow&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.3.0-3.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["python-pillow-debuginfo-10.3.0-3.oe2403sp3.aarch64.rpm","python-pillow-debugsource-10.3.0-3.oe2403sp3.aarch64.rpm","python3-pillow-10.3.0-3.oe2403sp3.aarch64.rpm","python3-pillow-devel-10.3.0-3.oe2403sp3.aarch64.rpm","python3-pillow-qt-10.3.0-3.oe2403sp3.aarch64.rpm","python3-pillow-tk-10.3.0-3.oe2403sp3.aarch64.rpm"],"noarch":["python3-pillow-help-10.3.0-3.oe2403sp3.noarch.rpm"],"src":["python-pillow-10.3.0-3.oe2403sp3.src.rpm"],"x86_64":["python-pillow-debuginfo-10.3.0-3.oe2403sp3.x86_64.rpm","python-pillow-debugsource-10.3.0-3.oe2403sp3.x86_64.rpm","python3-pillow-10.3.0-3.oe2403sp3.x86_64.rpm","python3-pillow-devel-10.3.0-3.oe2403sp3.x86_64.rpm","python3-pillow-qt-10.3.0-3.oe2403sp3.x86_64.rpm","python3-pillow-tk-10.3.0-3.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40192"}],"database_specific":{"severity":"High"}}
