It was discovered that ICU incorrectly handled certain inputs. If an application using ICU processed crafted data, a remote attacker could possibly cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program.
{ "availability": "No subscription required", "binaries": [ { "libicu-dev-dbgsym": "52.1-3ubuntu0.7", "icu-doc": "52.1-3ubuntu0.7", "libicu-dev": "52.1-3ubuntu0.7", "icu-devtools": "52.1-3ubuntu0.7", "libicu52-dbg": "52.1-3ubuntu0.7", "libicu52-dbgsym": "52.1-3ubuntu0.7", "libicu52": "52.1-3ubuntu0.7", "icu-devtools-dbgsym": "52.1-3ubuntu0.7" } ] }
{ "availability": "No subscription required", "binaries": [ { "libicu55": "55.1-7ubuntu0.3", "libicu-dev-dbgsym": "55.1-7ubuntu0.3", "icu-doc": "55.1-7ubuntu0.3", "libicu-dev": "55.1-7ubuntu0.3", "icu-devtools": "55.1-7ubuntu0.3", "libicu55-dbgsym": "55.1-7ubuntu0.3", "icu-devtools-dbgsym": "55.1-7ubuntu0.3", "libicu55-dbg": "55.1-7ubuntu0.3" } ] }