Bug 1939210 (CVE-2020-36280)

Summary: CVE-2020-36280 leptonica: heap-based buffer overflow in pixReadFromTiffStream
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dchen, jkucera, manisandro
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in leptonica. A heap-based buffer over-read in the pixReadFromTiffStream function in tiffio.c file may allow an attacker to read data from an application using leptonica. The highest threat from this vulnerability is to data confidentiality.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-28 14:08:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1939213, 1939211, 1939212, 1942948    
Bug Blocks: 1939215    

Description Guilherme de Almeida Suckevicz 2021-03-15 18:01:52 UTC
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c.

Reference:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654

Upstream patch:
https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c

Comment 1 Guilherme de Almeida Suckevicz 2021-03-15 18:02:17 UTC
Created leptonica tracking bugs for this issue:

Affects: epel-7 [bug 1939213]
Affects: fedora-all [bug 1939211]


Created mingw-leptonica tracking bugs for this issue:

Affects: fedora-all [bug 1939212]