==========================================================================
Ubuntu Security Notice USN-3408-1
September 04, 2017
liblouis vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Liblouis.
Software Description:
– liblouis: Braille translation library – utilities
Details:
It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)
It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)
It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified
other impact. (CVE-2017-13740, CVE-2017-13742)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
liblouis-bin 3.0.0-3ubuntu0.2
liblouis12 3.0.0-3ubuntu0.2
python-louis 3.0.0-3ubuntu0.2
python3-louis 3.0.0-3ubuntu0.2
Ubuntu 16.04 LTS:
liblouis-bin 2.6.4-2ubuntu0.1
liblouis9 2.6.4-2ubuntu0.1
python-louis 2.6.4-2ubuntu0.1
python3-louis 2.6.4-2ubuntu0.1
Ubuntu 14.04 LTS:
liblouis-bin 2.5.3-2ubuntu1.1
liblouis2 2.5.3-2ubuntu1.1
python-louis 2.5.3-2ubuntu1.1
python3-louis 2.5.3-2ubuntu1.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3408-1
CVE-2017-13738, CVE-2017-13739, CVE-2017-13740, CVE-2017-13742,
CVE-2017-13744
Package Information:
https://launchpad.net/ubuntu/+source/liblouis/3.0.0-3ubuntu0.2
https://launchpad.net/ubuntu/+source/liblouis/2.6.4-2ubuntu0.1
https://launchpad.net/ubuntu/+source/liblouis/2.5.3-2ubuntu1.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=Epq1
—–END PGP SIGNATURE—–
—