SUSE-SU-2018:2780-1: moderate: Security update for liblouis

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Sep 21 04:15:13 MDT 2018


   SUSE Security Update: Security update for liblouis
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2780-1
Rating:             moderate
References:         #1095189 #1095825 #1095826 #1095827 #1095945 
                    #1097103 
Cross-References:   CVE-2018-11440 CVE-2018-11577 CVE-2018-11683
                    CVE-2018-11684 CVE-2018-11685 CVE-2018-12085
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that fixes 6 vulnerabilities is now available.

Description:

   This update for liblouis, python-louis, python3-louis fixes the following
   issues:

   Security issues fixed:

   - CVE-2018-11440: Fixed a stack-based buffer overflow in the function
     parseChars() in compileTranslationTable.c (bsc#1095189)
   - CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c
     (bsc#1095945)
   - CVE-2018-11683: Fixed a stack-based buffer overflow in the function
     parseChars() in compileTranslationTable.c (different vulnerability than
     CVE-2018-11440) (bsc#1095827)
   - CVE-2018-11684: Fixed stack-based buffer overflow in the function
     includeFile() in compileTranslationTable.c (bsc#1095826)
   - CVE-2018-11685: Fixed a stack-based buffer overflow in the function
     compileHyphenation() in compileTranslationTable.c (bsc#1095825)
   - CVE-2018-12085: Fixed a stack-based buffer overflow in the function
     parseChars() in compileTranslationTable.c (different vulnerability than
     CVE-2018-11440) (bsc#1097103)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1944=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1944=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1944=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      liblouis-debugsource-2.6.4-6.6.1
      liblouis-devel-2.6.4-6.6.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      liblouis-data-2.6.4-6.6.1
      liblouis-debugsource-2.6.4-6.6.1
      liblouis9-2.6.4-6.6.1
      liblouis9-debuginfo-2.6.4-6.6.1
      python-louis-2.6.4-6.6.1
      python3-louis-2.6.4-6.6.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      liblouis-data-2.6.4-6.6.1
      liblouis-debugsource-2.6.4-6.6.1
      liblouis9-2.6.4-6.6.1
      liblouis9-debuginfo-2.6.4-6.6.1
      python3-louis-2.6.4-6.6.1


References:

   https://www.suse.com/security/cve/CVE-2018-11440.html
   https://www.suse.com/security/cve/CVE-2018-11577.html
   https://www.suse.com/security/cve/CVE-2018-11683.html
   https://www.suse.com/security/cve/CVE-2018-11684.html
   https://www.suse.com/security/cve/CVE-2018-11685.html
   https://www.suse.com/security/cve/CVE-2018-12085.html
   https://bugzilla.suse.com/1095189
   https://bugzilla.suse.com/1095825
   https://bugzilla.suse.com/1095826
   https://bugzilla.suse.com/1095827
   https://bugzilla.suse.com/1095945
   https://bugzilla.suse.com/1097103



More information about the sle-updates mailing list