First published: Sat Jun 09 2018(Updated: )
Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis Liblouis | =3.6.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.0 | |
ubuntu/liblouis | <3.5.0-1ubuntu0.3 | 3.5.0-1ubuntu0.3 |
ubuntu/liblouis | <2.5.3-2ubuntu1.5 | 2.5.3-2ubuntu1.5 |
ubuntu/liblouis | <3.5.0-4 | 3.5.0-4 |
ubuntu/liblouis | <2.6.4-2ubuntu0.4 | 2.6.4-2ubuntu0.4 |
debian/liblouis | 3.16.0-1 3.24.0-1 3.30.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12085 is a stack-based buffer overflow vulnerability in Liblouis 3.6.0.
The severity of CVE-2018-12085 is high (8.8).
CVE-2018-12085 affects Liblouis version 3.6.0.
To fix CVE-2018-12085, upgrade to Liblouis version 3.8.0-2, 3.16.0-1, 3.24.0-1, or 3.27.0-1.
Yes, you can find additional references for CVE-2018-12085 at the following URLs: http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html, https://github.com/liblouis/liblouis/issues/595, and https://usn.ubuntu.com/3782-1/