Note:
This project will be discontinued after December 13, 2021. [more]
2018-02-16
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
Products | Debian_linux, Leptonica |
Type | Out-of-bounds Write (CWE-787) |
First patch |
https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a |
Relevant file/s |
• ./README.md (modified, +2, -1)
• ./prog/xtractprotos.c (modified, +7, -7) • ./src/gplot.c (modified, +36, -36) • ./src/ptabasic.c (modified, +2, -2) • ./src/sel1.c (modified, +9, -9) |
Links |
• https://security.gentoo.org/glsa/202312-01
• https://lists.debian.org/debian-lts-announce/2018/03/msg00005.html • https://lists.debian.org/debian-lts/2018/02/msg00054.html • https://bugs.debian.org/890548 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: