USN-3408-1: Liblouis vulnerabilities

USN-3408-1: Liblouis vulnerabilities

Ubuntu Security Notice USN-3408-1

4th September, 2017

liblouis vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Liblouis.

Software description

  • liblouis
    – Braille translation library – utilities

Details

It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)

It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)

It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified other
impact. (CVE-2017-13740, CVE-2017-13742)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.04:
python-louis

3.0.0-3ubuntu0.2
python3-louis

3.0.0-3ubuntu0.2
liblouis12

3.0.0-3ubuntu0.2
liblouis-bin

3.0.0-3ubuntu0.2
Ubuntu 16.04 LTS:
python-louis

2.6.4-2ubuntu0.1
python3-louis

2.6.4-2ubuntu0.1
liblouis9

2.6.4-2ubuntu0.1
liblouis-bin

2.6.4-2ubuntu0.1
Ubuntu 14.04 LTS:
python-louis

2.5.3-2ubuntu1.1
python3-louis

2.5.3-2ubuntu1.1
liblouis2

2.5.3-2ubuntu1.1
liblouis-bin

2.5.3-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-13738,

CVE-2017-13739,

CVE-2017-13740,

CVE-2017-13742,

CVE-2017-13744

Source: USN-3408-1: Liblouis vulnerabilities

About KENNETH 19694 Articles
지락문화예술공작단

Be the first to comment

Leave a Reply

Your email address will not be published.


*


이 사이트는 스팸을 줄이는 아키스밋을 사용합니다. 댓글이 어떻게 처리되는지 알아보십시오.