USN-591-1: libicu vulnerabilities

Publication date

24 March 2008

Overview

libicu vulnerabilities


Packages

Details

Will Drewry discovered that libicu did not properly handle ‘\0’ when
processing regular expressions. If an application linked against libicu
processed a crafted regular expression, an attacker could execute
arbitrary code with privileges of the user invoking the program.
(CVE-2007-4770)

Will Drewry discovered that libicu did not properly limit its
backtracking stack size. If an application linked against libicu
processed a crafted regular expression, an attacker could cause a denial
of service via resource exhaustion. (CVE-2007-4771)

Will Drewry discovered that libicu did not properly handle ‘\0’ when
processing regular expressions. If an application linked against libicu
processed a crafted regular expression, an attacker could execute
arbitrary code with privileges of the user invoking the program.
(CVE-2007-4770)

Will Drewry discovered that libicu did not properly limit its
backtracking stack size. If an application linked against libicu
processed a crafted regular expression, an attacker could cause a denial
of service via resource exhaustion. (CVE-2007-4771)

Update instructions

After a standard system upgrade you need to restart applications linked against libicu, such as OpenOffice.org, to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.10 gutsy libicu36 –  3.6-3ubuntu0.1
7.04 feisty libicu36 –  3.6-2ubuntu0.1
6.10 edgy libicu34 –  3.4.1a-1ubuntu1.6.10.1
6.06 dapper libicu34 –  3.4.1a-1ubuntu1.6.06.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›