MGASA-2015-0297

Source
https://advisories.mageia.org/MGASA-2015-0297.html
Import Source
https://advisories.mageia.org/MGASA-2015-0297.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0297
Related
Published
2015-07-31T22:46:26Z
Modified
2015-07-31T22:34:17Z
Summary
Updated icu package fixes security vulnerability
Details

It was discovered that ICU Layout Engine was missing multiple boundary checks. These could lead to buffer overflows memory corruption. A specially crafted file could cause an application using ICU to parse untrusted font files to crash and, possibly, execute arbitrary code (CVE-2015-4760).

References
Credits

Affected packages

Mageia:4 / icu

Package

Name
icu
Purl
pkg:rpm/mageia/icu?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.1-2.5.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / icu

Package

Name
icu
Purl
pkg:rpm/mageia/icu?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
53.1-12.2.mga5

Ecosystem specific

{
    "section": "core"
}