Product:

Liblouis

(Liblouis)
Repositories https://github.com/liblouis/liblouis
#Vulnerabilities 19
Date Id Summary Products Score Patch Annotated
2019-08-02 CVE-2014-8184 CVE-2014-8184 liblouis: stack-based buffer overflow in findTable() Liblouis 8.8
2022-03-13 CVE-2022-26981 Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationTable.c (called, indirectly, by tools/lou_checktable.c). Ipados, Iphone_os, Macos, Tvos, Watchos, Fedora, Liblouis 7.8
2022-06-02 CVE-2022-31783 Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace. Fedora, Liblouis 5.5
2018-06-09 CVE-2018-12085 Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440. Ubuntu_linux, Liblouis, Leap 8.8
2018-06-04 CVE-2018-11685 Liblouis 3.5.0 has a stack-based Buffer Overflow in the function compileHyphenation in compileTranslationTable.c. Ubuntu_linux, Liblouis, Leap 8.8
2018-06-04 CVE-2018-11684 Liblouis 3.5.0 has a stack-based Buffer Overflow in the function includeFile in compileTranslationTable.c. Ubuntu_linux, Liblouis, Leap 8.8
2018-06-04 CVE-2018-11683 Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440. Ubuntu_linux, Liblouis, Leap 8.8
2018-05-25 CVE-2018-11440 Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c. Ubuntu_linux, Liblouis, Leap 8.8
2018-07-27 CVE-2017-15101 A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution. Liblouis, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_workstation 9.8
2018-09-21 CVE-2018-17294 The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries. Ubuntu_linux, Liblouis, Leap 6.5