USN-3408-1: Liblouis vulnerabilities

Ubuntu Security Notice USN-3408-1

4th September, 2017

liblouis vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Liblouis.

Software description

  • liblouis - Braille translation library - utilities

Details

It was discovered that an illegal address access can be made in
Liblouis. A remote attacker can take advantange of this to
access sensitive information. (CVE-2017-13738, CVE-2017-13744)

It was discovered a heap-based buffer overflow that causes bytes
out-of-bounds write in Liblouis. A remote attacker can use this to
denial of service or remote code execution. (CVE-2017-13739)

It was discovered a stack-based buffer overflow in Liblouis. A remote
attacker can use this to denial of service or possibly unspecified other
impact. (CVE-2017-13740, CVE-2017-13742)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.04:
python-louis 3.0.0-3ubuntu0.2
python3-louis 3.0.0-3ubuntu0.2
liblouis12 3.0.0-3ubuntu0.2
liblouis-bin 3.0.0-3ubuntu0.2
Ubuntu 16.04 LTS:
python-louis 2.6.4-2ubuntu0.1
python3-louis 2.6.4-2ubuntu0.1
liblouis9 2.6.4-2ubuntu0.1
liblouis-bin 2.6.4-2ubuntu0.1
Ubuntu 14.04 LTS:
python-louis 2.5.3-2ubuntu1.1
python3-louis 2.5.3-2ubuntu1.1
liblouis2 2.5.3-2ubuntu1.1
liblouis-bin 2.5.3-2ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-13738, CVE-2017-13739, CVE-2017-13740, CVE-2017-13742, CVE-2017-13744