RedHat: RHSA-2017-3111:01 Moderate: liblouis security update
Summary
Liblouis is an open source braille translator and back-translator named in
honor of Louis Braille. It features support for computer and literary
braille, supports contracted and uncontracted translation for many
languages and has support for hyphenation. New languages can easily be
added through tables that support a rule or dictionary based approach.
Liblouis also supports math braille (Nemeth and Marburg).
Security Fix(es):
* Multiple flaws were found in the processing of translation tables in
liblouis. An attacker could crash or potentially execute arbitrary code
using malicious translation tables. (CVE-2014-8184, CVE-2017-13738,
CVE-2017-13740, CVE-2017-13741, CVE-2017-13742, CVE-2017-13743,
CVE-2017-13744)
The CVE-2014-8184 issue was discovered by Raphael Sanchez Prudencio (Red
Hat).
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2014-8184 https://access.redhat.com/security/cve/CVE-2017-13738 https://access.redhat.com/security/cve/CVE-2017-13740 https://access.redhat.com/security/cve/CVE-2017-13741 https://access.redhat.com/security/cve/CVE-2017-13742 https://access.redhat.com/security/cve/CVE-2017-13743 https://access.redhat.com/security/cve/CVE-2017-13744 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux Client (v. 7):
Source:
liblouis-2.5.2-11.el7_4.src.rpm
noarch:
liblouis-python-2.5.2-11.el7_4.noarch.rpm
x86_64:
liblouis-2.5.2-11.el7_4.i686.rpm
liblouis-2.5.2-11.el7_4.x86_64.rpm
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch:
liblouis-doc-2.5.2-11.el7_4.noarch.rpm
x86_64:
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
liblouis-devel-2.5.2-11.el7_4.i686.rpm
liblouis-devel-2.5.2-11.el7_4.x86_64.rpm
liblouis-utils-2.5.2-11.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
liblouis-2.5.2-11.el7_4.src.rpm
aarch64:
liblouis-2.5.2-11.el7_4.aarch64.rpm
liblouis-debuginfo-2.5.2-11.el7_4.aarch64.rpm
noarch:
liblouis-python-2.5.2-11.el7_4.noarch.rpm
ppc64:
liblouis-2.5.2-11.el7_4.ppc.rpm
liblouis-2.5.2-11.el7_4.ppc64.rpm
liblouis-debuginfo-2.5.2-11.el7_4.ppc.rpm
liblouis-debuginfo-2.5.2-11.el7_4.ppc64.rpm
ppc64le:
liblouis-2.5.2-11.el7_4.ppc64le.rpm
liblouis-debuginfo-2.5.2-11.el7_4.ppc64le.rpm
s390x:
liblouis-2.5.2-11.el7_4.s390.rpm
liblouis-2.5.2-11.el7_4.s390x.rpm
liblouis-debuginfo-2.5.2-11.el7_4.s390.rpm
liblouis-debuginfo-2.5.2-11.el7_4.s390x.rpm
x86_64:
liblouis-2.5.2-11.el7_4.i686.rpm
liblouis-2.5.2-11.el7_4.x86_64.rpm
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64:
liblouis-debuginfo-2.5.2-11.el7_4.aarch64.rpm
liblouis-devel-2.5.2-11.el7_4.aarch64.rpm
liblouis-utils-2.5.2-11.el7_4.aarch64.rpm
noarch:
liblouis-doc-2.5.2-11.el7_4.noarch.rpm
ppc64:
liblouis-debuginfo-2.5.2-11.el7_4.ppc.rpm
liblouis-debuginfo-2.5.2-11.el7_4.ppc64.rpm
liblouis-devel-2.5.2-11.el7_4.ppc.rpm
liblouis-devel-2.5.2-11.el7_4.ppc64.rpm
liblouis-utils-2.5.2-11.el7_4.ppc64.rpm
ppc64le:
liblouis-debuginfo-2.5.2-11.el7_4.ppc64le.rpm
liblouis-devel-2.5.2-11.el7_4.ppc64le.rpm
liblouis-utils-2.5.2-11.el7_4.ppc64le.rpm
s390x:
liblouis-debuginfo-2.5.2-11.el7_4.s390.rpm
liblouis-debuginfo-2.5.2-11.el7_4.s390x.rpm
liblouis-devel-2.5.2-11.el7_4.s390.rpm
liblouis-devel-2.5.2-11.el7_4.s390x.rpm
liblouis-utils-2.5.2-11.el7_4.s390x.rpm
x86_64:
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
liblouis-devel-2.5.2-11.el7_4.i686.rpm
liblouis-devel-2.5.2-11.el7_4.x86_64.rpm
liblouis-utils-2.5.2-11.el7_4.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
liblouis-2.5.2-11.el7_4.src.rpm
noarch:
liblouis-python-2.5.2-11.el7_4.noarch.rpm
x86_64:
liblouis-2.5.2-11.el7_4.i686.rpm
liblouis-2.5.2-11.el7_4.x86_64.rpm
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch:
liblouis-doc-2.5.2-11.el7_4.noarch.rpm
x86_64:
liblouis-debuginfo-2.5.2-11.el7_4.i686.rpm
liblouis-debuginfo-2.5.2-11.el7_4.x86_64.rpm
liblouis-devel-2.5.2-11.el7_4.i686.rpm
liblouis-devel-2.5.2-11.el7_4.x86_64.rpm
liblouis-utils-2.5.2-11.el7_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for liblouis is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
Bugs Fixed
1488933 - CVE-2017-13738 liblouis: Illegal address access in the _lou_getALine function
1488935 - CVE-2017-13744 liblouis: Illegal address access in the _lou_getALine() function
1488937 - CVE-2017-13740 liblouis: Stack-buffer overflow in the parseChars() function
1488938 - CVE-2017-13741 liblouis: Use-after-free in the function compileBrailleIndicator()
1488939 - CVE-2017-13742 liblouis: Stack-buffer overflow in the function includeFile()
1488942 - CVE-2017-13743 liblouis: Buffer overflow in the function _lou_showString()
1492701 - CVE-2014-8184 liblouis: stack-based buffer overflow in findTable()