{"id":"UBUNTU-CVE-2020-36278","details":"Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.","modified":"2025-10-24T04:48:59Z","published":"2021-03-12T00:15:00Z","upstream":["CVE-2020-36278"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36278"},{"type":"REPORT","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433"},{"type":"REPORT","url":"https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842"},{"type":"REPORT","url":"https://github.com/DanBloomberg/leptonica/compare/1.79.0...1.80.0"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2020-36278"}],"affected":[{"package":{"name":"leptonlib","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/leptonlib@1.70.1-1ubuntu0.1~esm1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.69-4ubuntu1","1.69-4ubuntu2","1.69-4ubuntu3","1.69-4ubuntu4","1.70.1-1","1.70.1-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.70.1-1ubuntu0.1~esm1","binary_name":"leptonica-progs"},{"binary_version":"1.70.1-1ubuntu0.1~esm1","binary_name":"liblept4"},{"binary_version":"1.70.1-1ubuntu0.1~esm1","binary_name":"libleptonica-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36278.json"}},{"package":{"name":"leptonlib","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/leptonlib@1.73-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.72-3","1.72-3build1","1.73-1","1.73-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.73-1ubuntu0.1~esm1","binary_name":"leptonica-progs"},{"binary_version":"1.73-1ubuntu0.1~esm1","binary_name":"liblept5"},{"binary_version":"1.73-1ubuntu0.1~esm1","binary_name":"libleptonica-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36278.json"}},{"package":{"name":"leptonlib","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/leptonlib@1.75.3-3ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.74.4-1","1.74.4-2","1.75.3-1","1.75.3-2","1.75.3-3","1.75.3-3ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.75.3-3ubuntu0.1~esm1","binary_name":"leptonica-progs"},{"binary_version":"1.75.3-3ubuntu0.1~esm1","binary_name":"liblept5"},{"binary_version":"1.75.3-3ubuntu0.1~esm1","binary_name":"libleptonica-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36278.json"}},{"package":{"name":"leptonlib","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/leptonlib@1.79.0-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.78.0-2","1.79.0-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.79.0-1","binary_name":"leptonica-progs"},{"binary_version":"1.79.0-1","binary_name":"liblept5"},{"binary_version":"1.79.0-1","binary_name":"libleptonica-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36278.json"}},{"package":{"name":"leptonlib","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/leptonlib@1.82.0-3build1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.79.0-1.1","1.82.0-3","1.82.0-3build1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.82.0-3build1","binary_name":"leptonica-progs"},{"binary_version":"1.82.0-3build1","binary_name":"liblept5"},{"binary_version":"1.82.0-3build1","binary_name":"libleptonica-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-36278.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}