This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2798513194832079353== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="bCvcu2qcnT26P5D3rvtJGnu9DSd6bJTWr"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --bCvcu2qcnT26P5D3rvtJGnu9DSd6bJTWr Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2522-3 March 10, 2015
icu vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
ICU could be made to crash or run programs as your login if it processed specially crafted data.
Software Description: - icu: International Components for Unicode library
Details:
USN-2522-1 fixed vulnerabilities in ICU. On Ubuntu 12.04 LTS, the font patches caused a regression when using LibreOffice Calc. The patches have now been updated to fix the regression.
We apologize for the inconvenience.
Original advisory details:
It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS. (CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419) It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-6585, CVE-2014-6591) It was discovered that ICU incorrectly handled memory operations when processing regular expressions. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7923, CVE-2014-7926, CVE-2014-9654) It was discovered that ICU collator implementation incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7940)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: libicu48 4.8.1.1-3ubuntu0.5
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2522-3 http://www.ubuntu.com/usn/usn-2522-1 CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419, CVE-2014-6585, CVE-2014-6591
Package Information: https://launchpad.net/ubuntu/+source/icu/4.8.1.1-3ubuntu0.5
--bCvcu2qcnT26P5D3rvtJGnu9DSd6bJTWr Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJU/1IXAAoJEGVp2FWnRL6ToykP/RQf3HSGSZ1YSTQKJYODlqKW ArK8gAA5FYsReU0GmZ+5GNFePYHyDdnbQ5xOvwDyiKOdOperNPIF4yQ6ytYog3mn h/jOYvDRpAPPR0mXOkvV2Awq/32pzlj4oOpyq/eKw1t59DsYVMekB2RU1G6yebZy /0pjIJy2TZJuFBM+JRD4WAg9NKM58TPwNsv+sFeNLJDat8RGWvBbFn0mxK281w00 uRFyUIXxmAk2a3Ywl0MUqmUAyrtPVO8Yd4j4qynwPjzhO69lyS30kGDOttxdXq0f W1+qqdKkdYHVxjRtR0xaS/MEiBWG/1QSAArMLBMsDRkHrpuT9R7MGKGUm+FSBtTx WpSJBln5j9nUfVG12kV571o5Gs76mLVM0BrZIaPKEZg3BrdR9RvLyJHpML7CckLX qcTYY6TE1Q+nfiK13lmRfHKdULPWQEVxE+AY/cKEX3GNMLuyHliGtgKL/WtsHoTO mFJamAqc0icbb6q50RhhvNVAYDyOSgi7W8fZ1yywdunYFarnyDrDv6z6+noSC3KN jJvjPRND9Ocyx4wX4TRkj9n19OPTWVXY1wND5O6bCZ3WrKleTpXMsicvvitfUkpl Ct1CzneQRl68vu0g2/gPqNAuJW5/HahfbsZEHWRUtezjbY8peajo8IydIxOt4maU L/5X7hBlEKWrOD+OSTkX =NRwq -----END PGP SIGNATURE-----
--bCvcu2qcnT26P5D3rvtJGnu9DSd6bJTWr--
--===============2798513194832079353== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2798513194832079353==--
|