First published: Tue Mar 17 2020(Updated: )
André Bargull discovered that ICU incorrectly handled certain strings. An attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libicu63 | <63.2-2ubuntu0.1 | 63.2-2ubuntu0.1 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/libicu60 | <60.2-3ubuntu3.1 | 60.2-3ubuntu3.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libicu55 | <55.1-7ubuntu0.5 | 55.1-7ubuntu0.5 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libicu52 | <52.1-3ubuntu0.8+esm1 | 52.1-3ubuntu0.8+esm1 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/libicu48 | <4.8.1.1-3ubuntu0.10 | 4.8.1.1-3ubuntu0.10 |
Ubuntu Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4305-1 is the vulnerability ID for the ICU vulnerability.
André Bargull discovered the ICU vulnerability.
The ICU vulnerability could allow an attacker to execute arbitrary code.
The ICU vulnerability affects Ubuntu versions 19.10, 18.04, 16.04, 14.04, and 12.04.
To fix the ICU vulnerability, update the libicu package to the recommended remedy version.