First published: Mon Jun 04 2018(Updated: )
Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis Liblouis | =3.5.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.0 | |
debian/liblouis | 3.16.0-1 3.24.0-1 3.30.0-2 | |
ubuntu/liblouis | <3.0.0-3ubuntu1.2 | 3.0.0-3ubuntu1.2 |
ubuntu/liblouis | <3.5.0-1ubuntu0.2 | 3.5.0-1ubuntu0.2 |
ubuntu/liblouis | <2.5.3-2ubuntu1.4 | 2.5.3-2ubuntu1.4 |
ubuntu/liblouis | <3.5.0-3 | 3.5.0-3 |
ubuntu/liblouis | <2.6.4-2ubuntu0.3 | 2.6.4-2ubuntu0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11683 is a stack-based buffer overflow vulnerability in Liblouis 3.5.0.
CVE-2018-11683 has a severity rating of 8.8 (high).
CVE-2018-11683 affects Liblouis version 3.5.0.
Yes, the affected versions of Liblouis can be fixed by updating to versions 3.8.0-2, 3.16.0-1, 3.24.0-1, or 3.27.0-1.
More information about CVE-2018-11683 can be found at the following references: [link1], [link2], [link3].