Ubuntu Security Notice USN-3408-1
4th September, 2017
liblouis vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Liblouis.
Software description
- liblouis - Braille translation library - utilities
Details
It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)
It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)
It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified other
impact. (CVE-2017-13740, CVE-2017-13742)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 17.04:
- python-louis 3.0.0-3ubuntu0.2
- python3-louis 3.0.0-3ubuntu0.2
- liblouis12 3.0.0-3ubuntu0.2
- liblouis-bin 3.0.0-3ubuntu0.2
- Ubuntu 16.04 LTS:
- python-louis 2.6.4-2ubuntu0.1
- python3-louis 2.6.4-2ubuntu0.1
- liblouis9 2.6.4-2ubuntu0.1
- liblouis-bin 2.6.4-2ubuntu0.1
- Ubuntu 14.04 LTS:
- python-louis 2.5.3-2ubuntu1.1
- python3-louis 2.5.3-2ubuntu1.1
- liblouis2 2.5.3-2ubuntu1.1
- liblouis-bin 2.5.3-2ubuntu1.1
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
In general, a standard system update will make all the necessary changes.
References
CVE-2017-13738, CVE-2017-13739, CVE-2017-13740, CVE-2017-13742, CVE-2017-13744
from Ubuntu Security Notices http://ift.tt/2wAJZq5
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.