USN-5143-1

Source
https://ubuntu.com/security/notices/USN-5143-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5143-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5143-1
Related
Published
2022-02-08T09:57:31.116392Z
Modified
2022-02-08T09:57:31.116392Z
Summary
leptonlib vulnerability
Details

It was discovered that Leptonica incorrectly handled certain image files. An attacker could possibly use this issue to execute arbitrary code or other unspecified impact.

References

Affected packages

Ubuntu:Pro:18.04:LTS / leptonlib

Package

Name
leptonlib
Purl
pkg:deb/ubuntu/leptonlib@1.75.3-3ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.75.3-3ubuntu0.1~esm1

Affected versions

1.*

1.74.4-1
1.74.4-2
1.75.3-1
1.75.3-2
1.75.3-3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.75.3-3ubuntu0.1~esm1",
            "binary_name": "leptonica-progs"
        },
        {
            "binary_version": "1.75.3-3ubuntu0.1~esm1",
            "binary_name": "leptonica-progs-dbgsym"
        },
        {
            "binary_version": "1.75.3-3ubuntu0.1~esm1",
            "binary_name": "liblept5"
        },
        {
            "binary_version": "1.75.3-3ubuntu0.1~esm1",
            "binary_name": "liblept5-dbgsym"
        },
        {
            "binary_version": "1.75.3-3ubuntu0.1~esm1",
            "binary_name": "libleptonica-dev"
        }
    ]
}