ALT-PU-2022-1147-1
Package libleptonica updated to version 1.82.0-alt1 for branch p10 in task 293364.
Closed vulnerabilities
BDU:2018-00492
Уязвимость функции gplotMakeOutput библиотеки для работы с изображениями Leptonica, позволяющая нарушителю выполнить произвольную команду
BDU:2018-00494
Уязвимость функций gplotRead и ptaReadStream библиотеки для работы с изображениями Leptonica, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2022-05686
Уязвимость компонента tiffio.c библиотеки обработки изображений Leptonica, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-7186
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
- https://bugs.debian.org/890548
- https://bugs.debian.org/890548
- https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
- https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
- https://lists.debian.org/debian-lts/2018/02/msg00054.html
- https://lists.debian.org/debian-lts/2018/02/msg00054.html
- [debian-lts-announce] 20180307 [SECURITY] [DLA 1302-1] leptonlib security update
- [debian-lts-announce] 20180307 [SECURITY] [DLA 1302-1] leptonlib security update
- GLSA-202312-01
- GLSA-202312-01
Modified: 2024-11-21
CVE-2018-7247
An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact.
Modified: 2024-11-21
CVE-2018-7440
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function allows command injection via a $(command) approach in the gplot rootname argument. This issue exists because of an incomplete fix for CVE-2018-3836.
- https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212
- https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212
- [debian-lts-announce] 20180307 [SECURITY] [DLA 1302-1] leptonlib security update
- [debian-lts-announce] 20180307 [SECURITY] [DLA 1302-1] leptonlib security update
- GLSA-202312-01
- GLSA-202312-01
Modified: 2024-11-21
CVE-2018-7441
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
Modified: 2024-11-21
CVE-2018-7442
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function does not block '/' characters in the gplot rootname argument, potentially leading to path traversal and arbitrary file overwrite.
Modified: 2024-11-21
CVE-2020-36280
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
- https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c
- https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c
- https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
- https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0
- FEDORA-2021-f5f2803fff
- FEDORA-2021-f5f2803fff
- FEDORA-2021-977ebc82da
- FEDORA-2021-977ebc82da
- GLSA-202107-53
- GLSA-202107-53
Modified: 2024-11-21
CVE-2022-38266
An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
- https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614
- https://github.com/tesseract-ocr/tesseract/issues/3498
- [debian-lts-announce] 20221208 [SECURITY] [DLA 3233-1] leptonlib security update
- GLSA-202312-01
- https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614
- GLSA-202312-01
- [debian-lts-announce] 20221208 [SECURITY] [DLA 3233-1] leptonlib security update
- https://github.com/tesseract-ocr/tesseract/issues/3498