Debian 10225 Published by

A leptonlib security update has been released for Debian GNU/Linux 8 Extended LTS to address several issues related to the unsafe processing of untrusted input and dealing with predictable paths below /tmp.



ELA-765-1 leptonlib security update

Package : leptonlib
Version : 1.71-2.1+deb8u2 (jessie)

Related CVEs :
CVE-2018-3836
CVE-2018-7186
CVE-2018-7441
CVE-2018-7442
CVE-2022-38266

This update fixes several issues related to unsafe processing of untrusted input and dealing with predictable paths below /tmp. Part of the affected functionality is primarily intended for debugging leptonlib. This functionality has been disabled rather than fixed. It can reenabled by issuing a call to setLeptDebugOK(1). This change in behaviour was performed upstream and in Debian 10 and later.

CVE-2018-3836
An exploitable command injection vulnerability exists in the gplotMakeOutput function. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.

CVE-2018-7186
Leptonica does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.

CVE-2018-7441
Leptonica uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

CVE-2018-7442
The gplotMakeOutput function does not block '/' characters in the gplot rootname argument, potentially leading to path traversal and arbitrary file overwrite.

CVE-2022-38266
An issue in the Leptonica linked library allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.

  ELA-765-1 leptonlib security update