First published: Fri May 25 2018(Updated: )
Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis Liblouis | =3.5.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.0 | |
ubuntu/liblouis | <3.0.0-3ubuntu1.1 | 3.0.0-3ubuntu1.1 |
ubuntu/liblouis | <3.5.0-1ubuntu0.1 | 3.5.0-1ubuntu0.1 |
ubuntu/liblouis | <2.5.3-2ubuntu1.3 | 2.5.3-2ubuntu1.3 |
ubuntu/liblouis | <2.6.4-2ubuntu0.2 | 2.6.4-2ubuntu0.2 |
debian/liblouis | 3.16.0-1 3.24.0-1 3.30.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11440 is a vulnerability in Liblouis 3.5.0 that allows for a stack-based buffer overflow.
CVE-2018-11440 has a severity rating of 8.8, which is classified as high.
The affected software includes Liblouis versions 3.5.0, 3.8.0-2, 3.16.0-1, 3.24.0-1, and 3.27.0-1 on Debian, as well as various versions on Ubuntu and openSUSE Leap.
To fix CVE-2018-11440, you should update Liblouis to version 3.8.0-2 or later on Debian, and apply the appropriate remedies on other affected software.
You can find more information about CVE-2018-11440 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html), [2](http://www.securityfocus.com/bid/104321), [3](https://github.com/liblouis/liblouis/issues/575)