You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa liblouis

Sigurnosni nedostaci programskog paketa liblouis

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for liblouis
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1160-1
Rating: moderate
References: #1094685 #1095189 #1095825 #1095826 #1095827
#1095945 #1097103 #1109319
Cross-References: CVE-2018-11410 CVE-2018-11440 CVE-2018-11577
CVE-2018-11683 CVE-2018-11684 CVE-2018-11685
CVE-2018-12085 CVE-2018-17294
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:

This update for liblouis fixes the following issues:

Security issues fixed:

– CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput
function which could allow a remote attacker to cause Denail of Service
(bsc#1109319).
– CVE-2018-11410: Fixed an invalid free in the compileRule function in
compileTranslationTable.c (bsc#1094685)
– CVE-2018-11440: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (bsc#1095189)
– CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
(bsc#1095945)
– CVE-2018-11683: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1095827)
– CVE-2018-11684: Fixed stack-based buffer overflow in the function
includeFile() in compileTranslationTable.c (bsc#1095826)
– CVE-2018-11685: Fixed a stack-based buffer overflow in the function
compileHyphenation() in compileTranslationTable.c (bsc#1095825)
– CVE-2018-12085: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1097103)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1160=1

Package List:

– openSUSE Leap 15.0 (x86_64):

liblouis-data-3.3.0-lp150.3.3.1
liblouis-debuginfo-3.3.0-lp150.3.3.1
liblouis-debugsource-3.3.0-lp150.3.3.1
liblouis-devel-3.3.0-lp150.3.3.1
liblouis-doc-3.3.0-lp150.3.3.1
liblouis-tools-3.3.0-lp150.3.3.1
liblouis-tools-debuginfo-3.3.0-lp150.3.3.1
liblouis14-3.3.0-lp150.3.3.1
liblouis14-debuginfo-3.3.0-lp150.3.3.1
python3-louis-3.3.0-lp150.3.3.1

References:

https://www.suse.com/security/cve/CVE-2018-11410.html
https://www.suse.com/security/cve/CVE-2018-11440.html
https://www.suse.com/security/cve/CVE-2018-11577.html
https://www.suse.com/security/cve/CVE-2018-11683.html
https://www.suse.com/security/cve/CVE-2018-11684.html
https://www.suse.com/security/cve/CVE-2018-11685.html
https://www.suse.com/security/cve/CVE-2018-12085.html
https://www.suse.com/security/cve/CVE-2018-17294.html
https://bugzilla.suse.com/1094685
https://bugzilla.suse.com/1095189
https://bugzilla.suse.com/1095825
https://bugzilla.suse.com/1095826
https://bugzilla.suse.com/1095827
https://bugzilla.suse.com/1095945
https://bugzilla.suse.com/1097103
https://bugzilla.suse.com/1109319


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa znc

Otkriven je sigurnosni nedostatak u programskom paketu znc za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close