Mehrere Probleme in liblouis
ID: | USN-3408-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04 |
Datum: | Mo, 4. September 2017, 17:15 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13742 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13739 |
Applikationen: | liblouis |
Originalnachricht |
|
--===============7021341088588093727== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-yRr/nfqBcd1oQUe/LwT+" --=-yRr/nfqBcd1oQUe/LwT+ Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: base64 ========================================================================== Ubuntu Security Notice USN-3408-1 September 04, 2017 liblouis vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.04 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Liblouis. Software Description: - liblouis: Braille translation library - utilities Details: It was discovered that an illegal address access can be made in Liblouis. A remote attacker can take advantange of this to access sensitive information. (CVE-2017-13738, CVE-2017-13744) It was discovered a heap-based buffer overflow that causes bytes out-of-bounds write in Liblouis. A remote attacker can use this to denial of service or remote code execution. (CVE-2017-13739) It was discovered a stack-based buffer overflow in Liblouis. A remote attacker can use this to denial of service or possibly unspecified other impact. (CVE-2017-13740, CVE-2017-13742) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.04: liblouis-bin 3.0.0-3ubuntu0.2 liblouis12 3.0.0-3ubuntu0.2 python-louis 3.0.0-3ubuntu0.2 python3-louis 3.0.0-3ubuntu0.2 Ubuntu 16.04 LTS: liblouis-bin 2.6.4-2ubuntu0.1 liblouis9 2.6.4-2ubuntu0.1 python-louis 2.6.4-2ubuntu0.1 python3-louis 2.6.4-2ubuntu0.1 Ubuntu 14.04 LTS: liblouis-bin 2.5.3-2ubuntu1.1 liblouis2 2.5.3-2ubuntu1.1 python-louis 2.5.3-2ubuntu1.1 python3-louis 2.5.3-2ubuntu1.1 In general, a standard system update will make all the necessary changes. References: https://www.ubuntu.com/usn/usn-3408-1 CVE-2017-13738, CVE-2017-13739, CVE-2017-13740, CVE-2017-13742, CVE-2017-13744 Package Information: https://launchpad.net/ubuntu/+source/liblouis/3.0.0-3ubuntu0.2 https://launchpad.net/ubuntu/+source/liblouis/2.6.4-2ubuntu0.1 https://launchpad.net/ubuntu/+source/liblouis/2.5.3-2ubuntu1.1 |