MGASA-2016-0186

Source
https://advisories.mageia.org/MGASA-2016-0186.html
Import Source
https://advisories.mageia.org/MGASA-2016-0186.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0186
Related
Published
2016-05-20T11:38:30Z
Modified
2016-05-20T11:29:24Z
Summary
Updated icu packages fix security vulnerability
Details

It was discovered that ICU Layout Engine was missing multiple boundary and error return checks. These could lead to buffer overflows and memory corruption. A specially crafted font file could cause an application using ICU to parse untrusted fonts to crash and, possibly, execute arbitrary code (CVE-2015-4844).

References
Credits

Affected packages

Mageia:5 / icu

Package

Name
icu
Purl
pkg:rpm/mageia/icu?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
53.1-12.3.mga5

Ecosystem specific

{
    "section": "core"
}