CVE-2020-36280
https://notcve.org/view.php?id=CVE-2020-36280
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c. Leptonica versiones anteriores a 1.80.0, permite una lectura excesiva del búfer en la región heap de la memoria en la función pixReadFromTiffStream, relacionado con el archivo tiffio.c • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW https://security.gentoo.org/glsa/202107-53 • CWE-125: Out-of-bounds Read •
CVE-2020-36279
https://notcve.org/view.php?id=CVE-2020-36279
Leptonica before 1.80.0 allows a heap-based buffer over-read in rasteropGeneralLow, related to adaptmap_reg.c and adaptmap.c. Leptonica versiones anteriores a 1.80.0, permite una lectura excesiva del búfer en la región heap de la memoria en la función rasteropGeneralLow, relacionada con los archivos adaptmap_reg.c y adaptmap.c • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22512 https://github.com/DanBloomberg/leptonica/commit/3c18c43b6a3f753f0dfff99610d46ad46b8bfac4 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW • CWE-125: Out-of-bounds Read •
CVE-2020-36278
https://notcve.org/view.php?id=CVE-2020-36278
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c. Leptonica versiones anteriores a la 1.80.0, permite una lectura excesiva del búfer en la región heap de la memoria en la función findNextBorderPixel en el archivo ccbord.c • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW • CWE-125: Out-of-bounds Read •
CVE-2020-36277
https://notcve.org/view.php?id=CVE-2020-36277
Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c. Leptonica versiones anteriores a 1.80.0, permite una denegación de servicio (bloqueo de la aplicación) por medio de un desplazamiento incorrecto a la izquierda en la función pixConvert2To8 en el archivo pixconv.c • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21997 https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0 https://github.com/DanBloomberg/leptonica/pull/499 https://lists.debian.org/debian-lts-announce/2021/03/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQUEA2X6UTH4DMYCMZAWE2QQLN5YANUA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD5AIWHWE334HGYZJR2U3I3JYKSSO2LW https://security. • CWE-670: Always-Incorrect Control Flow Implementation •
CVE-2021-21772
https://notcve.org/view.php?id=CVE-2021-21772
A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de uso de la memoria previamente liberada en la funcionalidad NMR::COpcPackageReader::releaseZIP() de 3MF Consortium lib3mf versión 2.0.0. Un archivo 3MF especialmente diseñado puede conllevar a una ejecución de código. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHMMHD2EOMIVJ7EKZTJJMX4C7E6ZRWDL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPBS642OYVA6DUKK3HZHEINVWEDZSMEU https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDGGB65YBQL662M3MOBNNJJNRNURW4TG https://security.gentoo.org/glsa/202208-01 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226 https://www.debian.org/security/2021/dsa-4887 https://w • CWE-416: Use After Free •