Security update for liblouis

SUSE Security Update: Security update for liblouis
Announcement ID: SUSE-SU-2017:2590-1
Rating: moderate
References: #1056090 #1056093 #1056095 #1056097 #1056101
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

  • An update that solves four vulnerabilities and has one errata is now available.

    Description:

    This update for liblouis fixes several issues.

    These security issues were fixed:

    - CVE-2017-13739: Prevent heap-based buffer overflow in the function
    resolveSubtable() that could have caused DoS or remote code execution
    (bsc#1056101)
    - CVE-2017-13740: Prevent stack-based buffer overflow in the function
    parseChars() that could have caused DoS or possibly unspecified other
    impact (bsc#1056097) ()
    - CVE-2017-13741: Prevent use-after-free in function
    compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
    - CVE_2017-13742: Prevent stack-based buffer overflow in function
    includeFile that allowed to cause remote DoS (bsc#1056093).
    - CVE-2017-13743: Prevent buffer overflow triggered in the function
    _lou_showString() that allowed to cause remote DoS (bsc#1056090)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-liblouis-13291=1
    • SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-liblouis-13291=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • liblouis-1.7.0-1.3.3.1
      • liblouis0-1.7.0-1.3.3.1
      • python-louis-1.7.0-1.3.3.1
    • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • liblouis-debuginfo-1.7.0-1.3.3.1
      • liblouis-debugsource-1.7.0-1.3.3.1

    References: