The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis-bin" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis-bin-dbgsym" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis-data" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis-dev" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis14" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "liblouis14-dbgsym" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "python-louis" }, { "binary_version": "3.5.0-1ubuntu0.3", "binary_name": "python3-louis" } ] }