Mailinglist Archive: opensuse-security-announce (108 mails)

< Previous Next >
[security-announce] openSUSE-SU-2019:1160-1: moderate: Security update for liblouis
openSUSE Security Update: Security update for liblouis
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1160-1
Rating: moderate
References: #1094685 #1095189 #1095825 #1095826 #1095827
#1095945 #1097103 #1109319
Cross-References: CVE-2018-11410 CVE-2018-11440 CVE-2018-11577
CVE-2018-11683 CVE-2018-11684 CVE-2018-11685
CVE-2018-12085 CVE-2018-17294
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:

This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput
function which could allow a remote attacker to cause Denail of Service
(bsc#1109319).
- CVE-2018-11410: Fixed an invalid free in the compileRule function in
compileTranslationTable.c (bsc#1094685)
- CVE-2018-11440: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
(bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function
includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1097103)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1160=1



Package List:

- openSUSE Leap 15.0 (x86_64):

liblouis-data-3.3.0-lp150.3.3.1
liblouis-debuginfo-3.3.0-lp150.3.3.1
liblouis-debugsource-3.3.0-lp150.3.3.1
liblouis-devel-3.3.0-lp150.3.3.1
liblouis-doc-3.3.0-lp150.3.3.1
liblouis-tools-3.3.0-lp150.3.3.1
liblouis-tools-debuginfo-3.3.0-lp150.3.3.1
liblouis14-3.3.0-lp150.3.3.1
liblouis14-debuginfo-3.3.0-lp150.3.3.1
python3-louis-3.3.0-lp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-11410.html
https://www.suse.com/security/cve/CVE-2018-11440.html
https://www.suse.com/security/cve/CVE-2018-11577.html
https://www.suse.com/security/cve/CVE-2018-11683.html
https://www.suse.com/security/cve/CVE-2018-11684.html
https://www.suse.com/security/cve/CVE-2018-11685.html
https://www.suse.com/security/cve/CVE-2018-12085.html
https://www.suse.com/security/cve/CVE-2018-17294.html
https://bugzilla.suse.com/1094685
https://bugzilla.suse.com/1095189
https://bugzilla.suse.com/1095825
https://bugzilla.suse.com/1095826
https://bugzilla.suse.com/1095827
https://bugzilla.suse.com/1095945
https://bugzilla.suse.com/1097103
https://bugzilla.suse.com/1109319

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages