Vulnerability Description
Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Liblouis | Liblouis | 3.6.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Opensuse | Leap | 15.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.htmlMailing ListThird Party Advisory
- https://github.com/liblouis/liblouis/issues/595Issue TrackingPatchThird Party Advisory
- https://usn.ubuntu.com/3782-1/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.htmlMailing ListThird Party Advisory
- https://github.com/liblouis/liblouis/issues/595Issue TrackingPatchThird Party Advisory
- https://usn.ubuntu.com/3782-1/Third Party Advisory
FAQ
What is CVE-2018-12085?
CVE-2018-12085 is a vulnerability with a CVSS score of 8.8 (HIGH). Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
How severe is CVE-2018-12085?
CVE-2018-12085 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12085?
Check the references section above for vendor advisories and patch information. Affected products include: Liblouis Liblouis, Canonical Ubuntu Linux, Opensuse Leap.