[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1302-1] leptonlib security update

Package        : leptonlib
Version        : 1.69-3.1+deb7u2
CVE ID         : CVE-2018-7186 CVE-2018-7440
Debian Bug     : 890548 891932

Different flaws have been found in leptonlib, an image processing


    Leptonica did not limit the number of characters in a %s format
    argument to fscanf or sscanf, that made it possible to remote
    attackers to cause a denial of service (stack-based buffer overflow)
    or possibly have unspecified other impact via a long string.


    The gplotMakeOutput function allowed command injection via a
    $(command) approach in the gplot rootname argument. This issue
    existed because of an incomplete fix for CVE-2018-3836.

For Debian 7 "Wheezy", these problems have been fixed in version

We recommend that you upgrade your leptonlib packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: