{"id":"CVE-2018-7441","details":"Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.","modified":"2026-03-14T09:31:06.286561Z","published":"2018-02-23T21:29:00.663Z","related":["openSUSE-SU-2024:10914-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts/2018/02/msg00054.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202312-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/danbloomberg/leptonica","events":[{"introduced":"0"},{"last_affected":"ee301cb2029db8a6289c5295daa42bba7715e99a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.75.3"}]}}],"versions":["1.74.0","1.74.1","1.74.2","1.74.3","1.74.4","1.75.0","1.75.1","1.75.2","1.75.3","v1.42","v1.44","v1.46","v1.48","v1.50","v1.52","v1.54","v1.56","v1.58","v1.60","v1.61","v1.62","v1.63","v1.64","v1.65","v1.66","v1.67","v1.68","v1.69","v1.70","v1.71","v1.72","v1.73","v1.74.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7441.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}