Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts/2018/02/msg00054.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202312-01 | |
https://lists.debian.org/debian-lts/2018/02/msg00054.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202312-01 |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts/2018/02/msg00054.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202312-01 - |
18 Dec 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2018-02-23 21:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7441
Mitre link : CVE-2018-7441
CVE.ORG link : CVE-2018-7441
JSON object : View
Products Affected
leptonica
- leptonica
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')