Security update for liblouis
Announcement ID: | SUSE-SU-2019:0795-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for liblouis fixes the following issues:
Security issues fixed:
- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function which could allow a remote attacker to cause Denail of Service (bsc#1109319).
- CVE-2018-11410: Fixed an invalid free in the compileRule function in compileTranslationTable.c (bsc#1094685)
- CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Desktop Applications Module 15
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-795=1
Package List:
-
Desktop Applications Module 15 (aarch64 ppc64le s390x x86_64)
- liblouis14-3.3.0-4.5.1
- liblouis-debugsource-3.3.0-4.5.1
- liblouis-data-3.3.0-4.5.1
- liblouis-debuginfo-3.3.0-4.5.1
- liblouis-devel-3.3.0-4.5.1
- liblouis14-debuginfo-3.3.0-4.5.1
- python3-louis-3.3.0-4.5.1
References:
- https://www.suse.com/security/cve/CVE-2018-11410.html
- https://www.suse.com/security/cve/CVE-2018-11440.html
- https://www.suse.com/security/cve/CVE-2018-11577.html
- https://www.suse.com/security/cve/CVE-2018-11683.html
- https://www.suse.com/security/cve/CVE-2018-11684.html
- https://www.suse.com/security/cve/CVE-2018-11685.html
- https://www.suse.com/security/cve/CVE-2018-12085.html
- https://www.suse.com/security/cve/CVE-2018-17294.html
- https://bugzilla.suse.com/show_bug.cgi?id=1094685
- https://bugzilla.suse.com/show_bug.cgi?id=1095189
- https://bugzilla.suse.com/show_bug.cgi?id=1095825
- https://bugzilla.suse.com/show_bug.cgi?id=1095826
- https://bugzilla.suse.com/show_bug.cgi?id=1095827
- https://bugzilla.suse.com/show_bug.cgi?id=1095945
- https://bugzilla.suse.com/show_bug.cgi?id=1097103
- https://bugzilla.suse.com/show_bug.cgi?id=1109319