Security update for liblouis
Announcement ID: | SUSE-SU-2018:2780-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for liblouis, python-louis, python3-louis fixes the following issues:
Security issues fixed:
- CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP3
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1944=1
-
SUSE Linux Enterprise Software Development Kit 12 SP3
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1944=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1944=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1944=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1944=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP3 (x86_64)
- liblouis-debugsource-2.6.4-6.6.1
- liblouis-data-2.6.4-6.6.1
- liblouis9-2.6.4-6.6.1
- python3-louis-2.6.4-6.6.1
- liblouis9-debuginfo-2.6.4-6.6.1
-
SUSE Linux Enterprise Software Development Kit 12 SP3 (aarch64 ppc64le s390x x86_64)
- liblouis-devel-2.6.4-6.6.1
- liblouis-debugsource-2.6.4-6.6.1
-
SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
- python-louis-2.6.4-6.6.1
- liblouis-debugsource-2.6.4-6.6.1
- liblouis-data-2.6.4-6.6.1
- liblouis9-2.6.4-6.6.1
- python3-louis-2.6.4-6.6.1
- liblouis9-debuginfo-2.6.4-6.6.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
- python-louis-2.6.4-6.6.1
- liblouis-debugsource-2.6.4-6.6.1
- liblouis-data-2.6.4-6.6.1
- liblouis9-2.6.4-6.6.1
- python3-louis-2.6.4-6.6.1
- liblouis9-debuginfo-2.6.4-6.6.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
- python-louis-2.6.4-6.6.1
- liblouis-debugsource-2.6.4-6.6.1
- liblouis-data-2.6.4-6.6.1
- liblouis9-2.6.4-6.6.1
- python3-louis-2.6.4-6.6.1
- liblouis9-debuginfo-2.6.4-6.6.1
References:
- https://www.suse.com/security/cve/CVE-2018-11440.html
- https://www.suse.com/security/cve/CVE-2018-11577.html
- https://www.suse.com/security/cve/CVE-2018-11683.html
- https://www.suse.com/security/cve/CVE-2018-11684.html
- https://www.suse.com/security/cve/CVE-2018-11685.html
- https://www.suse.com/security/cve/CVE-2018-12085.html
- https://bugzilla.suse.com/show_bug.cgi?id=1095189
- https://bugzilla.suse.com/show_bug.cgi?id=1095825
- https://bugzilla.suse.com/show_bug.cgi?id=1095826
- https://bugzilla.suse.com/show_bug.cgi?id=1095827
- https://bugzilla.suse.com/show_bug.cgi?id=1095945
- https://bugzilla.suse.com/show_bug.cgi?id=1097103