Your submission was sent successfully! Close

CVE-2018-7441

Published: 23 February 2018

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

Priority

Low

CVSS 3 base score: 7.0

Status

Package Release Status
leptonlib
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Needed

cosmic
Released (1.76.0-1)
disco
Released (1.76.0-1)
eoan
Released (1.76.0-1)
focal
Released (1.76.0-1)
groovy
Released (1.76.0-1)
hirsute
Released (1.76.0-1)
impish
Released (1.76.0-1)
jammy
Released (1.76.0-1)
precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)

Notes

AuthorNote
ebarretto
Neutralised by kernel hardening
https://lists.debian.org/debian-lts/2018/02/msg00054.html

References

Bugs