Lucene search

K
amazonAmazonALAS2-2023-2013
HistoryApr 13, 2023 - 7:28 p.m.

Important: liblouis

2023-04-1319:28:00
alas.aws.amazon.com
14
buffer overflow
liblouis
remote attacker
denial of service
update
vulnerability
amazon linux 2
red hat
mitre
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

61.7%

Issue Overview:

Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint. (CVE-2023-26767)

Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions. (CVE-2023-26768)

Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c. (CVE-2023-26769)

Affected Packages:

liblouis

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update liblouis to update your system.

New Packages:

aarch64:  
    liblouis-2.6.2-21.amzn2.0.2.aarch64  
    liblouis-devel-2.6.2-21.amzn2.0.2.aarch64  
    liblouis-utils-2.6.2-21.amzn2.0.2.aarch64  
    liblouis-debuginfo-2.6.2-21.amzn2.0.2.aarch64  
  
i686:  
    liblouis-2.6.2-21.amzn2.0.2.i686  
    liblouis-devel-2.6.2-21.amzn2.0.2.i686  
    liblouis-utils-2.6.2-21.amzn2.0.2.i686  
    liblouis-debuginfo-2.6.2-21.amzn2.0.2.i686  
  
noarch:  
    python2-louis-2.6.2-21.amzn2.0.2.noarch  
    python3-louis-2.6.2-21.amzn2.0.2.noarch  
    liblouis-doc-2.6.2-21.amzn2.0.2.noarch  
  
src:  
    liblouis-2.6.2-21.amzn2.0.2.src  
  
x86_64:  
    liblouis-2.6.2-21.amzn2.0.2.x86_64  
    liblouis-devel-2.6.2-21.amzn2.0.2.x86_64  
    liblouis-utils-2.6.2-21.amzn2.0.2.x86_64  
    liblouis-debuginfo-2.6.2-21.amzn2.0.2.x86_64  

Additional References

Red Hat: CVE-2023-26767, CVE-2023-26768, CVE-2023-26769

Mitre: CVE-2023-26767, CVE-2023-26768, CVE-2023-26769

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

61.7%