Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in liblouis
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in liblouis
ID: USN-3408-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04
Datum: Mo, 4. September 2017, 17:15
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13742
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13739
Applikationen: liblouis

Originalnachricht


--===============7021341088588093727==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-yRr/nfqBcd1oQUe/LwT+"


--=-yRr/nfqBcd1oQUe/LwT+
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-3408-1
September 04, 2017

liblouis vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Liblouis.

Software Description:
- liblouis: Braille translation library - utilities

Details:

It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)

It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)

It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified
other impact. (CVE-2017-13740, CVE-2017-13742)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  liblouis-bin                    3.0.0-3ubuntu0.2
  liblouis12                      3.0.0-3ubuntu0.2
  python-louis                    3.0.0-3ubuntu0.2
  python3-louis                   3.0.0-3ubuntu0.2

Ubuntu 16.04 LTS:
  liblouis-bin                    2.6.4-2ubuntu0.1
  liblouis9                       2.6.4-2ubuntu0.1
  python-louis                    2.6.4-2ubuntu0.1
  python3-louis                   2.6.4-2ubuntu0.1

Ubuntu 14.04 LTS:
  liblouis-bin                    2.5.3-2ubuntu1.1
  liblouis2                       2.5.3-2ubuntu1.1
  python-louis                    2.5.3-2ubuntu1.1
  python3-louis                   2.5.3-2ubuntu1.1

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3408-1
  CVE-2017-13738, CVE-2017-13739, CVE-2017-13740, CVE-2017-13742,
  CVE-2017-13744

Package Information:
  https://launchpad.net/ubuntu/+source/liblouis/3.0.0-3ubuntu0.2
  https://launchpad.net/ubuntu/+source/liblouis/2.6.4-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/liblouis/2.5.3-2ubuntu1.1
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung