{"id":"CVE-2020-5312","details":"libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.","aliases":["BIT-pillow-2020-5312","GHSA-p49h-hjvm-jg3h","PYSEC-2020-83"],"modified":"2026-04-16T04:35:04.207052735Z","published":"2020-01-03T01:15:11.243Z","related":["SUSE-RU-2020:2072-1","SUSE-RU-2020:2161-1","SUSE-SU-2020:1901-1","SUSE-SU-2020:2057-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4272-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4631"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0578"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0580"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0681"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0683"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0694"},{"type":"ADVISORY","url":"https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0566"},{"type":"FIX","url":"https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-pillow/pillow","events":[{"introduced":"0"},{"fixed":"a45c8583ff90312a2fddc38567ed736cef4af563"},{"introduced":"0"},{"last_affected":"82541b6dec8452cb612067fcebba1c5a1a2bfdc8"},{"introduced":"0"},{"last_affected":"6e28ed1f36d0eb74053af54e1eddc9c29db698cd"},{"fixed":"93b22b846e0269ee9594ff71a72bec02d2bea8fd"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.2.2"},{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["1.0","1.2","1.7.7","1.7.8","10.0.0","2.0.0","2.1.0","2.2.0","2.2.1","2.3.0","2.5.0","2.7.0","2.8.0","2.8.1","2.9.0","2.9.0.dev0","2.9.0.dev1","2.9.0.dev2","3.1.0","3.1.0-rc1","3.2.0","3.3.0","3.4.0","4.0.0","4.0.0a","4.1.0","4.2.0","4.3.0","5.0.0","5.1.0","5.2.0","5.3.0","5.4.0","6.0.0","6.1.0","6.2.0","6.2.1","7.0.0","7.1.0","7.2.0","8.0.0","8.1.0","8.2.0","8.3.0","8.4.0","9.0.0","9.1.0","9.2.0","9.3.0","9.4.0","9.5.0"],"database_specific":{"vanir_signatures":[{"deprecated":false,"signature_version":"v1","signature_type":"Function","digest":{"length":1273,"function_hash":"228195334488469053776152312293290694292"},"id":"CVE-2020-5312-ac16992a","target":{"function":"ImagingPcxDecode","file":"src/libImaging/PcxDecode.c"},"source":"https://github.com/python-pillow/pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd"},{"signature_version":"v1","id":"CVE-2020-5312-b19af775","signature_type":"Line","digest":{"line_hashes":["28176007691574792831032194145824532472","60039019189674651359812065381069837303","70280912336820827533766265349563168504","137238534060640963082355829647107153874"],"threshold":0.9},"deprecated":false,"target":{"file":"src/libImaging/PcxDecode.c"},"source":"https://github.com/python-pillow/pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]}],"vanir_signatures_modified":"2026-04-11T13:53:20Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5312.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}