{"id":"CVE-2020-10378","details":"In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state-\u003eshuffle is instructed to read beyond state-\u003ebuffer.","aliases":["BIT-pillow-2020-10378","GHSA-3xv8-3j54-hgrp","PYSEC-2020-77"],"modified":"2026-04-16T04:31:00.345939271Z","published":"2020-06-25T19:15:12.190Z","related":["SUSE-RU-2020:2161-1","SUSE-SU-2020:2057-1","SUSE-SU-2020:2911-1","SUSE-SU-2020:3309-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/"},{"type":"WEB","url":"https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html"},{"type":"WEB","url":"https://github.com/python-pillow/Pillow/commits/master/src/libImaging"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4430-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4430-2/"},{"type":"FIX","url":"https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac"},{"type":"FIX","url":"https://github.com/python-pillow/Pillow/pull/4538"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-pillow/pillow","events":[{"introduced":"0"},{"fixed":"f0fe60ae9f930faeda2f0c22f602bed1f8a0f1c7"},{"fixed":"6a83e4324738bb0452fbe8074a995b1c73f08de7"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.1.0"}]}}],"versions":["1.0","1.2","1.7.7","1.7.8","2.0.0","2.1.0","2.2.0","2.2.1","2.3.0","2.5.0","2.7.0","2.8.0","2.8.1","2.9.0","2.9.0.dev0","2.9.0.dev1","2.9.0.dev2","3.1.0","3.1.0-rc1","3.2.0","3.3.0","3.4.0","4.0.0","4.0.0a","4.1.0","4.2.0","4.3.0","5.0.0","5.1.0","5.2.0","5.3.0","5.4.0","6.0.0","6.1.0","6.2.0","7.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}],"vanir_signatures_modified":"2026-04-11T15:27:39Z","vanir_signatures":[{"signature_version":"v1","target":{"file":"src/libImaging/PcxDecode.c","function":"ImagingPcxDecode"},"digest":{"function_hash":"237027674255937501286717290487134717202","length":1418},"source":"https://github.com/python-pillow/pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7","deprecated":false,"signature_type":"Function","id":"CVE-2020-10378-78acc16d"},{"signature_version":"v1","target":{"file":"src/libImaging/PcxDecode.c"},"id":"CVE-2020-10378-ee72a343","digest":{"threshold":0.9,"line_hashes":["25901954450279011341742658171344170564","4064274618583996555694994057645488849","28176007691574792831032194145824532472","217779631413749524162890180010505715716","100250632816792623213214653223208827946","24042758865160182801373950721837609446","216173328986995126865716644862015367760"]},"deprecated":false,"signature_type":"Line","source":"https://github.com/python-pillow/pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10378.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}