Security update for liblouis

SUSE Security Update: Security update for liblouis
Announcement ID: SUSE-SU-2018:2569-1
Rating: moderate
References: #1095825 #1095826 #1095827
Cross-References: CVE-2018-11683 CVE-2018-11684 CVE-2018-11685
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

An update that fixes three vulnerabilities is now available.

Description:

This update for liblouis, python-louis fixes the following issues:
Security issues fixed:

  • CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826)
  • CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825)
  • CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095827)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 11-SP4:
    zypper in -t patch slessp4-liblouis-13764=1
  • SUSE Linux Enterprise Debuginfo 11-SP4:
    zypper in -t patch dbgsp4-liblouis-13764=1

Package List:

  • SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
    • liblouis-1.7.0-1.3.13.1
    • liblouis0-1.7.0-1.3.13.1
    • python-louis-1.7.0-1.3.13.1
  • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
    • liblouis-debuginfo-1.7.0-1.3.13.1
    • liblouis-debugsource-1.7.0-1.3.13.1

References: