Bug 1095826 (CVE-2018-11684) - VUL-1: CVE-2018-11684: liblouis: stack-based Buffer Overflow in the function includeFile
Summary: VUL-1: CVE-2018-11684: liblouis: stack-based Buffer Overflow in the function ...
Status: RESOLVED FIXED
Alias: CVE-2018-11684
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/207105/
Whiteboard: CVSSv3:SUSE:CVE-2018-11684:5.3:(AV:L/...
Keywords:
Depends on:
Blocks:
 
Reported: 2018-06-04 14:21 UTC by Alexander Bergmann
Modified: 2024-06-11 18:50 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2018-06-04 14:21:06 UTC
CVE-2018-11684

Liblouis 3.5.0 has a stack-based Buffer Overflow in the function includeFile in
compileTranslationTable.c.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-11684
https://github.com/liblouis/liblouis/issues/592
Comment 7 Swamp Workflow Management 2018-08-31 10:12:47 UTC
SUSE-SU-2018:2569-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 1095825,1095826,1095827
CVE References: CVE-2018-11683,CVE-2018-11684,CVE-2018-11685
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    liblouis-1.7.0-1.3.13.1, python-louis-1.7.0-1.3.13.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    liblouis-1.7.0-1.3.13.1
Comment 8 Swamp Workflow Management 2018-09-21 10:15:59 UTC
SUSE-SU-2018:2780-1: An update that fixes 6 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1095189,1095825,1095826,1095827,1095945,1097103
CVE References: CVE-2018-11440,CVE-2018-11577,CVE-2018-11683,CVE-2018-11684,CVE-2018-11685,CVE-2018-12085
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    liblouis-2.6.4-6.6.1
SUSE Linux Enterprise Server 12-SP3 (src):    liblouis-2.6.4-6.6.1, python-louis-2.6.4-6.6.1, python3-louis-2.6.4-6.6.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    liblouis-2.6.4-6.6.1, python3-louis-2.6.4-6.6.1
Comment 9 Swamp Workflow Management 2018-09-24 10:18:46 UTC
openSUSE-SU-2018:2819-1: An update that fixes 6 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1095189,1095825,1095826,1095827,1095945,1097103
CVE References: CVE-2018-11440,CVE-2018-11577,CVE-2018-11683,CVE-2018-11684,CVE-2018-11685,CVE-2018-12085
Sources used:
openSUSE Leap 42.3 (src):    liblouis-2.6.4-9.1, python-louis-2.6.4-9.1
Comment 12 Swamp Workflow Management 2019-03-28 17:10:56 UTC
SUSE-SU-2019:0795-1: An update that fixes 8 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1094685,1095189,1095825,1095826,1095827,1095945,1097103,1109319
CVE References: CVE-2018-11410,CVE-2018-11440,CVE-2018-11577,CVE-2018-11683,CVE-2018-11684,CVE-2018-11685,CVE-2018-12085,CVE-2018-17294
Sources used:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    liblouis-3.3.0-4.5.1
SUSE Linux Enterprise Module for Desktop Applications 15 (src):    liblouis-3.3.0-4.5.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2019-04-05 19:13:35 UTC
openSUSE-SU-2019:1160-1: An update that fixes 8 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1094685,1095189,1095825,1095826,1095827,1095945,1097103,1109319
CVE References: CVE-2018-11410,CVE-2018-11440,CVE-2018-11577,CVE-2018-11683,CVE-2018-11684,CVE-2018-11685,CVE-2018-12085,CVE-2018-17294
Sources used:
openSUSE Leap 15.0 (src):    liblouis-3.3.0-lp150.3.3.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.