CVE-2018-7441

Publication date 23 February 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.0 · High

Score breakdown

Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.

Read the notes from the security team

Status

Package Ubuntu Release Status
leptonlib 25.04 plucky
Fixed 1.76.0-1
24.10 oracular
Fixed 1.76.0-1
24.04 LTS noble
Fixed 1.76.0-1
23.10 mantic
Fixed 1.76.0-1
23.04 lunar
Fixed 1.76.0-1
22.10 kinetic
Fixed 1.76.0-1
22.04 LTS jammy
Fixed 1.76.0-1
21.10 impish
Fixed 1.76.0-1
21.04 hirsute
Fixed 1.76.0-1
20.10 groovy
Fixed 1.76.0-1
20.04 LTS focal
Fixed 1.76.0-1
19.10 eoan
Fixed 1.76.0-1
19.04 disco
Fixed 1.76.0-1
18.10 cosmic
Fixed 1.76.0-1
18.04 LTS bionic
Vulnerable
17.10 artful Ignored end of life
16.04 LTS xenial
Vulnerable
14.04 LTS trusty
Vulnerable

Notes


ebarretto

Neutralised by kernel hardening https://lists.debian.org/debian-lts/2018/02/msg00054.html

Severity score breakdown

Parameter Value
Base score 7.0 · High
Attack vector Local
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H