Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3725-1: icu security update

    Date 27 Nov 2016
    165
    Posted By LinuxSecurity Advisories
    Several vulnerabilities were discovered in the International Components for Unicode (ICU) library. CVE-2014-9911
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3725-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Luciano Bello
    November 27, 2016                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : icu
    CVE ID         : CVE-2014-9911 CVE-2015-2632 CVE-2015-4844 CVE-2016-0494 
                     CVE-2016-6293 CVE-2016-7415
    Debian Bug     : 838694
    
    Several vulnerabilities were discovered in the International Components
    for Unicode (ICU) library.
    
    CVE-2014-9911
    
        Michele Spagnuolo discovered a buffer overflow vulnerability which
        might allow remote attackers to cause a denial of service or possibly
        execute arbitrary code via crafted text.
    
    CVE-2015-2632
    
        An integer overflow vulnerability might lead into a denial of service
        or disclosure of portion of application memory if an attacker has
        control on the input file.
    
    CVE-2015-4844
    
        Buffer overflow vulnerabilities might allow an attacker with control
        on the font file to perform a denial of service attacker or,
        possibly, execute arbitrary code.
    
    CVE-2016-0494
    
        Integer signedness issues were introduced as part of the
        CVE-2015-4844 fix.
    
    CVE-2016-6293
    
        A buffer overflow might allow an attacker to perform a denial of
        service or disclosure of portion of application memory.
    
    CVE-2016-7415
    
        A stack-based buffer overflow might allow an attacker with control on
        the locale string to perform a denial of service and, possibly,
        execute arbitrary code.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 52.1-8+deb8u4.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 57.1-5.
    
    We recommend that you upgrade your icu packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.