Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7441

Опубликовано: 23 фев. 2018
Источник: debian

Описание

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
leptonlibfixed1.76.0-1package

Примечания

  • https://lists.debian.org/debian-lts/2018/02/msg00054.html

  • Not neutralised by kernel hardening, because subdirectories of /tmp are not hardened

  • https://github.com/DanBloomberg/leptonica/commit/dcaf546c748aaf13fd14289677037e83d749455f

  • The patch requires CVE-2018-7442 patch as underlying infrastructure.

  • The patch deactivates debugging functions by default and thus changes behaviour.

Связанные уязвимости

CVSS3: 7
ubuntu
почти 8 лет назад

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

CVSS3: 7
nvd
почти 8 лет назад

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

CVSS3: 7
github
больше 3 лет назад

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.