MGASA-2015-0286

Source
https://advisories.mageia.org/MGASA-2015-0286.html
Import Source
https://advisories.mageia.org/MGASA-2015-0286.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0286
Related
Published
2015-07-27T17:34:09Z
Modified
2015-07-27T17:22:57Z
Summary
Updated icu package fixes security vulnerabilities
Details

The ICU Project's ICU4C library, before 55.1, contains a heap-based buffer overflow in the resolveImplicitLevels function of ubidi.c (CVE-2014-8146).

The ICU Project's ICU4C library, before 55.1, contains an integer overflow in the resolveImplicitLevels function of ubidi.c due to the assignment of an int32 value to an int16 type (CVE-2014-8147).

The ucnviogetConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU) mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file (CVE-2015-1270).

References
Credits

Affected packages

Mageia:4 / icu

Package

Name
icu
Purl
pkg:rpm/mageia/icu?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.1-2.4.mga4

Ecosystem specific

{
    "section": "core"
}