Debian: DSA-5014-1: icu security update | LinuxSecurity.com

Advisories


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5014-1                   [email protected]
https://www.debian.org/security/                     Salvatore Bonaccorso
November 28, 2021                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icu
CVE ID         : CVE-2020-21913

Rongxin Wu discovered a use-after-free vulnerability in the
International Components for Unicode (ICU) library which could result in
denial of service or potentially the execution of arbitrary code.

For the oldstable distribution (buster), this problem has been fixed
in version 63.1-6+deb10u2.

We recommend that you upgrade your icu packages.

For the detailed security status of icu please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/icu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5014-1: icu security update

November 28, 2021
Rongxin Wu discovered a use-after-free vulnerability in the International Components for Unicode (ICU) library which could result in denial of service or potentially the execution ...

Summary

For the oldstable distribution (buster), this problem has been fixed
in version 63.1-6+deb10u2.

We recommend that you upgrade your icu packages.

For the detailed security status of icu please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/icu

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
Rongxin Wu discovered a use-after-free vulnerability in the
International Components for Unicode (ICU) library which could result in
denial of service or potentially the execution of arbitrary code.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.