USN-3408-1: Liblouis vulnerabilities
4 September 2017
Several security issues were fixed in Liblouis.
Releases
Packages
- liblouis - Braille translation library - utilities
Details
It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)
It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)
It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified other
impact. (CVE-2017-13740, CVE-2017-13742)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04
-
liblouis-bin
-
3.0.0-3ubuntu0.2
-
liblouis12
-
3.0.0-3ubuntu0.2
-
python-louis
-
3.0.0-3ubuntu0.2
-
python3-louis
-
3.0.0-3ubuntu0.2
Ubuntu 16.04
-
liblouis-bin
-
2.6.4-2ubuntu0.1
-
liblouis9
-
2.6.4-2ubuntu0.1
-
python-louis
-
2.6.4-2ubuntu0.1
-
python3-louis
-
2.6.4-2ubuntu0.1
Ubuntu 14.04
-
liblouis-bin
-
2.5.3-2ubuntu1.1
-
liblouis2
-
2.5.3-2ubuntu1.1
-
python-louis
-
2.5.3-2ubuntu1.1
-
python3-louis
-
2.5.3-2ubuntu1.1
In general, a standard system update will make all the necessary changes.