Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in liblouis
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in liblouis
ID: SUSE-SU-2018:2780-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3
Datum: Fr, 21. September 2018, 13:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11683
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11440
Applikationen: liblouis

Originalnachricht

   SUSE Security Update: Security update for liblouis
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:2780-1
Rating: moderate
References: #1095189 #1095825 #1095826 #1095827 #1095945
#1097103
Cross-References: CVE-2018-11440 CVE-2018-11577 CVE-2018-11683
CVE-2018-11684 CVE-2018-11685 CVE-2018-12085

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for liblouis, python-louis, python3-louis fixes the following
issues:

Security issues fixed:

- CVE-2018-11440: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (bsc#1095189)
- CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
(bsc#1095945)
- CVE-2018-11683: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1095827)
- CVE-2018-11684: Fixed stack-based buffer overflow in the function
includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-12085: Fixed a stack-based buffer overflow in the function
parseChars() in compileTranslationTable.c (different vulnerability than
CVE-2018-11440) (bsc#1097103)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1944=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1944=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1944=1



Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le
s390x x86_64):

liblouis-debugsource-2.6.4-6.6.1
liblouis-devel-2.6.4-6.6.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

liblouis-data-2.6.4-6.6.1
liblouis-debugsource-2.6.4-6.6.1
liblouis9-2.6.4-6.6.1
liblouis9-debuginfo-2.6.4-6.6.1
python-louis-2.6.4-6.6.1
python3-louis-2.6.4-6.6.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

liblouis-data-2.6.4-6.6.1
liblouis-debugsource-2.6.4-6.6.1
liblouis9-2.6.4-6.6.1
liblouis9-debuginfo-2.6.4-6.6.1
python3-louis-2.6.4-6.6.1


References:

https://www.suse.com/security/cve/CVE-2018-11440.html
https://www.suse.com/security/cve/CVE-2018-11577.html
https://www.suse.com/security/cve/CVE-2018-11683.html
https://www.suse.com/security/cve/CVE-2018-11684.html
https://www.suse.com/security/cve/CVE-2018-11685.html
https://www.suse.com/security/cve/CVE-2018-12085.html
https://bugzilla.suse.com/1095189
https://bugzilla.suse.com/1095825
https://bugzilla.suse.com/1095826
https://bugzilla.suse.com/1095827
https://bugzilla.suse.com/1095945
https://bugzilla.suse.com/1097103

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung