Описание
Security update for leptonica
This update for leptonica fixes the following issues:
- CVE-2018-7247: Fixed a buffer overflow in in src/viewfiles.c with unsanitized input (rootname) (boo#1081631)
- CVE-2018-7186: Fixed multiple stack-based buffer overflows in gplotRead() and ptaReadStream() (boo#1081576)
- CVE-2018-3836: Added additional bad characters, to prevent command injection by invoking it via $(command) (boo#1079358)
Список пакетов
openSUSE Leap 42.3
Ссылки
- E-Mail link for openSUSE-SU-2018:0615-1
- SUSE Security Ratings
Описание
An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.
Затронутые продукты
Ссылки
- CVE-2018-3836
- SUSE Bug 1079358
- SUSE Bug 1082747
Описание
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
Затронутые продукты
Ссылки
- CVE-2018-7186
- SUSE Bug 1081576
- SUSE Bug 1081631
Описание
An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact.
Затронутые продукты
Ссылки
- CVE-2018-7247
- SUSE Bug 1081631