Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#57539 - [leptonica] CVE-2018-7186
Attached to Project:
Community Packages
Opened by Karol Babioch (johnpatcher) - Saturday, 17 February 2018, 00:02 GMT
Last edited by Jelle van der Waa (jelly) - Tuesday, 27 February 2018, 19:43 GMT
Opened by Karol Babioch (johnpatcher) - Saturday, 17 February 2018, 00:02 GMT
Last edited by Jelle van der Waa (jelly) - Tuesday, 27 February 2018, 19:43 GMT
|
DetailsLeptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
References: https://nvd.nist.gov/vuln/detail/CVE-2018-7186 Upstream fix: https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
This task depends upon
Closed by Jelle van der Waa (jelly)
Tuesday, 27 February 2018, 19:43 GMT
Reason for closing: Fixed
Additional comments about closing: Updatd to 1.75.3
Tuesday, 27 February 2018, 19:43 GMT
Reason for closing: Fixed
Additional comments about closing: Updatd to 1.75.3
Comment by Karol Babioch (kbabioch) -
Monday, 26 February 2018, 13:20 GMT
The upstream fix is this: https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a