First published: Wed Sep 06 2017(Updated: )
There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact. Product bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - There is a Stack-buffer-overflow in liblouis which is triggered in function parseChars()." href="show_bug.cgi?id=1484306">https://bugzilla.redhat.com/show_bug.cgi?id=1484306</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Liblouis |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1488937 is categorized as high due to the potential for denial of service and other unspecified impacts.
To fix REDHAT-BUG-1488937, you should update to the latest version of Liblouis that contains the vulnerability patches.
The impact of REDHAT-BUG-1488937 includes a stack-based buffer overflow that can lead to denial of service.
Liblouis version 3.2.0 is explicitly affected by the vulnerability described in REDHAT-BUG-1488937.
The vulnerability in REDHAT-BUG-1488937 is a stack-based buffer overflow triggered in the function parseChars() in compileTranslationTable.c.