{"id":"MGASA-2015-0286","summary":"Updated icu package fixes security vulnerabilities","details":"The ICU Project's ICU4C library, before 55.1, contains a heap-based buffer\noverflow in the resolveImplicitLevels function of ubidi.c (CVE-2014-8146).\n\nThe ICU Project's ICU4C library, before 55.1, contains an integer overflow\nin the resolveImplicitLevels function of ubidi.c due to the assignment of\nan int32 value to an int16 type (CVE-2014-8147).\n\nThe ucnv_io_getConverterName function in common/ucnv_io.cpp in\nInternational Components for Unicode (ICU) mishandles converter names with\ninitial x- substrings, which allows remote attackers to cause a denial of\nservice (read of uninitialized memory) or possibly have unspecified other\nimpact via a crafted file (CVE-2015-1270).\n","modified":"2026-02-02T05:44:49.525569Z","published":"2015-07-27T17:34:09Z","related":["CVE-2014-8146","CVE-2014-8147","CVE-2015-1270"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0286.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16478"},{"type":"REPORT","url":"https://www.kb.cert.org/vuls/id/602540"},{"type":"REPORT","url":"http://googlechromereleases.blogspot.cz/2015/07/stable-channel-update_21.html"}],"affected":[{"package":{"name":"icu","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/icu?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"52.1-2.4.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0286.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}