USN-3227-1: ICU vulnerabilities
13 March 2017
Several security issues were fixed in ICU.
Releases
Packages
- icu - International Components for Unicode library
Details
It was discovered that ICU incorrectly handled certain memory operations
when processing data. If an application using ICU processed crafted data,
a remote attacker could possibly cause it to crash or potentially execute
arbitrary code with the privileges of the user invoking the program.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10
Ubuntu 16.04
Ubuntu 14.04
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
Related notices
- USN-2827-1: openjdk-6-jre, openjdk-6-jre-headless, icedtea-6-jre-jamvm, openjdk-6-jre-lib, openjdk-6, icedtea-6-jre-cacao, openjdk-6-jre-zero
- USN-2784-1: openjdk-7-jre-headless, openjdk-7-jdk, openjdk-7-demo, openjdk-7-doc, openjdk-7-jre-zero, openjdk-7-source, openjdk-7, openjdk-7-jre-lib, icedtea-7-jre-jamvm, openjdk-7-jre
- USN-2885-1: openjdk-6-jre, openjdk-6-jre-headless, icedtea-6-jre-jamvm, openjdk-6-jre-lib, openjdk-6, icedtea-6-jre-cacao, openjdk-6-jre-zero
- USN-2884-1: openjdk-7-jre-headless, openjdk-7-jdk, openjdk-7-demo, openjdk-7-doc, openjdk-7-jre-zero, openjdk-7-source, openjdk-7, openjdk-7-jre-lib, icedtea-7-jre-jamvm, openjdk-7-jre