{"id":"MGASA-2015-0102","summary":"Updated icu packages fix security vulnerability","details":"It was discovered that ICU incorrectly handled memory operations when\nprocessing fonts. If an application using ICU processed crafted data, an\nattacker could cause it to crash or potentially execute arbitrary code with\nthe privileges of the user invoking the program (CVE-2014-6585,\nCVE-2014-6591).\n","modified":"2026-02-01T19:17:27.466663Z","published":"2015-03-10T16:48:25Z","related":["CVE-2014-6585","CVE-2014-6591"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0102.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15435"},{"type":"REPORT","url":"http://www.ubuntu.com/usn/usn-2522-1/"}],"affected":[{"package":{"name":"icu","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/icu?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"52.1-2.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0102.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}