Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.70.1-1ubuntu0.1~esm1",
"binary_name": "leptonica-progs"
},
{
"binary_version": "1.70.1-1ubuntu0.1~esm1",
"binary_name": "liblept4"
},
{
"binary_version": "1.70.1-1ubuntu0.1~esm1",
"binary_name": "libleptonica-dev"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.73-1ubuntu0.1~esm1",
"binary_name": "leptonica-progs"
},
{
"binary_version": "1.73-1ubuntu0.1~esm1",
"binary_name": "liblept5"
},
{
"binary_version": "1.73-1ubuntu0.1~esm1",
"binary_name": "libleptonica-dev"
}
]
}