An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
References
Link | Resource |
---|---|
https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 | Patch Third Party Advisory |
https://github.com/tesseract-ocr/tesseract/issues/3498 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202312-01 | |
https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 | Patch Third Party Advisory |
https://github.com/tesseract-ocr/tesseract/issues/3498 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202312-01 |
Configurations
History
21 Nov 2024, 07:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 - Patch, Third Party Advisory | |
References | () https://github.com/tesseract-ocr/tesseract/issues/3498 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202312-01 - |
18 Dec 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (CONFIRM) https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:tesseract_project:tesseract:5.0.0:alpha-20210401:*:*:*:*:*:* cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
23 Nov 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file. | |
References |
|
15 Sep 2022, 03:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (MISC) https://github.com/tesseract-ocr/tesseract/issues/3498 - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:tesseract_project:tesseract:5.0.0:*:*:*:*:*:*:* | |
CWE | CWE-369 |
09 Sep 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-09 22:15
Updated : 2024-11-21 07:16
NVD link : CVE-2022-38266
Mitre link : CVE-2022-38266
CVE.ORG link : CVE-2022-38266
JSON object : View
Products Affected
debian
- debian_linux
leptonica
- leptonica
tesseract_project
- tesseract
CWE
CWE-369
Divide By Zero