MGASA-2017-0116

Source
https://advisories.mageia.org/MGASA-2017-0116.html
Import Source
https://advisories.mageia.org/MGASA-2017-0116.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0116
Related
Published
2017-04-24T07:27:32Z
Modified
2017-04-24T07:14:42Z
Summary
Updated icu packages fix security vulnerability
Details

It was discovered that icu did not correctly validate its input. An attacker could use this problem to trigger an out-of-bound write through a heap-based buffer overflow, thus causing a denial of service via application crash, or potential execution of arbitrary code (CVE-2017-7867, CVE-2017-7868).

References
Credits

Affected packages

Mageia:5 / icu

Package

Name
icu
Purl
pkg:rpm/mageia/icu?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
53.1-12.7.mga5

Ecosystem specific

{
    "section": "core"
}