Revision Date: | 2017-09-26 | Version: | 1 |
Title: | Security update for liblouis (Moderate) |
Description: |
This update for liblouis fixes several issues.
These security issues were fixed:
- CVE-2017-13738: Prevent illegal address access in the _lou_getALine function that allowed to cause remote DoS (bsc#1056105). - CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101). - CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097) - CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095). - CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093). - CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090). - CVE-2017-13744: Prevent illegal address access in the function _lou_getALine() that allowed to cause remote DoS (bsc#1056088).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1056088 1056090 1056093 1056095 1056097 1056101 1056105 CVE-2017-13738 CVE-2017-13739 CVE-2017-13740 CVE-2017-13741 CVE-2017-13743 CVE-2017-13744 SUSE-SU-2017:2570-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed AND Package Information
liblouis-data-2.6.4-6.3.1 is installed
OR liblouis9-2.6.4-6.3.1 is installed
OR python3-louis-2.6.4-6.3.1 is installed
|