[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1302-1] leptonlib security update



Package        : leptonlib
Version        : 1.69-3.1+deb7u2
CVE ID         : CVE-2018-7186 CVE-2018-7440
Debian Bug     : 890548 891932


Different flaws have been found in leptonlib, an image processing
library. 

CVE-2018-7186

    Leptonica did not limit the number of characters in a %s format
    argument to fscanf or sscanf, that made it possible to remote
    attackers to cause a denial of service (stack-based buffer overflow)
    or possibly have unspecified other impact via a long string.

CVE-2018-7440

    The gplotMakeOutput function allowed command injection via a
    $(command) approach in the gplot rootname argument. This issue
    existed because of an incomplete fix for CVE-2018-3836.

For Debian 7 "Wheezy", these problems have been fixed in version
1.69-3.1+deb7u2.

We recommend that you upgrade your leptonlib packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature


Reply to: