International Components for Unicode: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200803-20 / icu
||March 11, 2008
||May 28, 2009: 03
All supported architectures
Two vulnerabilities have been discovered in the International Components
for Unicode, possibly resulting in the remote execution of arbitrary code
or a Denial of Service.
International Components for Unicode is a set of C/C++ and Java
libraries providing Unicode and Globalization support for software
Will Drewry (Google Security) reported a vulnerability in the regular
expression engine when using back references to capture \0 characters
(CVE-2007-4770). He also found that the backtracking stack size is not
limited, possibly allowing for a heap-based buffer overflow
A remote attacker could submit specially crafted regular expressions to
an application using the library, possibly resulting in the remote
execution of arbitrary code with the privileges of the user running the
application or a Denial of Service.
There is no known workaround at this time.
All International Components for Unicode users should upgrade to the
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/icu-3.8.1-r1"