The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "liblouis-bin", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "liblouis-bin-dbgsym", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "liblouis-data", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "liblouis-dev", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "liblouis14", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "liblouis14-dbgsym", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "python-louis", "binary_version": "3.5.0-1ubuntu0.3" }, { "binary_name": "python3-louis", "binary_version": "3.5.0-1ubuntu0.3" } ] }