4.4 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow
local users to overwrite arbitrary files or have unspecified other impact
by creating files in advance or winning a race condition, as demonstrated
by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
Author | Note |
---|---|
ebarretto | Neutralised by kernel hardening https://lists.debian.org/debian-lts/2018/02/msg00054.html |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | leptonlib | < any | UNKNOWN |
ubuntu | 18.10 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 19.04 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 19.10 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 20.04 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 20.10 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 21.04 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 21.10 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 22.04 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
ubuntu | 22.10 | noarch | leptonlib | < 1.76.0-1 | UNKNOWN |
4.4 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%