Debian Security Advisory
DSA-1511-1 libicu -- various
- Date Reported:
- 03 Mar 2008
- Affected Packages:
- libicu
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 463688.
- More information:
-
Several local vulnerabilities have been discovered in libicu, International Components for Unicode, The Common Vulnerabilities and Exposures project identifies the following problems:
-
CVE-2007-4770
libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
-
CVE-2007-4771
Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.
For the stable distribution (etch), these problems have been fixed in version 3.6-2etch1.
For the unstable distribution (sid), these problems have been fixed in version 3.8-6.
We recommend that you upgrade your libicu package.
-
CVE-2007-4770
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz
- http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch1.dsc
- http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch1.diff.gz
- http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch1.dsc
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch1_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_mips.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.