- -------------------------------------------------------------------------
Debian Security Advisory DSA-3187-1                   security@debian.org
http://www.debian.org/security/                           Michael Gilbert
March 15, 2015                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icu
CVE ID         : CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2419
                 CVE-2014-6585 CVE-2014-6591 CVE-2014-7923 CVE-2014-7926
                 CVE-2014-7940 CVE-2014-9654
Debian Bug     : 775884 776264 776265 776719

Several vulnerabilities were discovered in the International Components
for Unicode (ICU) library.

CVE-2013-1569

    Glyph table issue.

CVE-2013-2383

    Glyph table issue.

CVE-2013-2384

    Font layout issue.

CVE-2013-2419

    Font processing issue.

CVE-2014-6585

    Out-of-bounds read.

CVE-2014-6591

    Additional out-of-bounds reads.

CVE-2014-7923

    Memory corruption in regular expression comparison.

CVE-2014-7926

    Memory corruption in regular expression comparison.

CVE-2014-7940

    Uninitialized memory.

CVE-2014-9654

    More regular expression flaws.

For the stable distribution (wheezy), these problems have been fixed in
version 4.8.1.1-12+deb7u2.

For the upcoming stable (jessie) and unstable (sid) distributions, these
problems have been fixed in version 52.1-7.1.

We recommend that you upgrade your icu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3187-1: icu security update

March 15, 2015
Several vulnerabilities were discovered in the International Components for Unicode (ICU) library

Summary

CVE-2013-1569

Glyph table issue.

CVE-2013-2383

Glyph table issue.

CVE-2013-2384

Font layout issue.

CVE-2013-2419

Font processing issue.

CVE-2014-6585

Out-of-bounds read.

CVE-2014-6591

Additional out-of-bounds reads.

CVE-2014-7923

Memory corruption in regular expression comparison.

CVE-2014-7926

Memory corruption in regular expression comparison.

CVE-2014-7940

Uninitialized memory.

CVE-2014-9654

More regular expression flaws.

For the stable distribution (wheezy), these problems have been fixed in
version 4.8.1.1-12+deb7u2.

For the upcoming stable (jessie) and unstable (sid) distributions, these
problems have been fixed in version 52.1-7.1.

We recommend that you upgrade your icu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Several vulnerabilities were discovered in the International Components
for Unicode (ICU) library.

Related News