CVE-2018-7186 (NVD)

2018-02-16

Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.

Products Debian_linux, Leptonica
Type Out-of-bounds Write (CWE-787)
First patch https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
Relevant file/s • ./README.md (modified, +2, -1)
• ./prog/xtractprotos.c (modified, +7, -7)
• ./src/gplot.c (modified, +36, -36)
• ./src/ptabasic.c (modified, +2, -2)
• ./src/sel1.c (modified, +9, -9)
Links https://security.gentoo.org/glsa/202312-01
https://lists.debian.org/debian-lts-announce/2018/03/msg00005.html
https://lists.debian.org/debian-lts/2018/02/msg00054.html
https://bugs.debian.org/890548

leptonica - Tree: ee301cb202

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: