suse-su-2018:1401-2
Vulnerability from csaf_suse
Published
2018-10-18 12:43
Modified
2018-10-18 12:43
Summary
Security update for icu

Notes

Title of the patch
Security update for icu
Description of the patch
icu was updated to fix two security issues. These security issues were fixed: - CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) used an integer data type that is inconsistent with a header file, which allowed remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text (bsc#929629). - CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) did not properly track directionally isolated pieces of text, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text (bsc#929629). - CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) for C/C++ did not ensure that there is a '\0' character at the end of a certain temporary array, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument (bsc#990636). - CVE-2017-7868: International Components for Unicode (ICU) for C/C++ 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function (bsc#1034674) - CVE-2017-7867: International Components for Unicode (ICU) for C/C++ 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function (bsc#1034678) - CVE-2017-14952: Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue (bnc#1067203) - CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC (bnc#1072193) - CVE-2017-15422: An integer overflow in icu during persian calendar date processing could lead to incorrect years shown (bnc#1077999)
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-979
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for icu",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "icu was updated to fix two security issues.\n\nThese security issues were fixed:\n- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c\n  in the Unicode Bidirectional Algorithm implementation in ICU4C in\n  International Components for Unicode (ICU) used an integer data type\n  that is inconsistent with a header file, which allowed remote attackers\n  to cause a denial of service (incorrect malloc followed by invalid free)\n  or possibly execute arbitrary code via crafted text (bsc#929629).\n- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c\n  in the Unicode Bidirectional Algorithm implementation in ICU4C in\n  International Components for Unicode (ICU) did not properly track\n  directionally isolated pieces of text, which allowed remote attackers\n  to cause a denial of service (heap-based buffer overflow) or possibly\n  execute arbitrary code via crafted text (bsc#929629).\n- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in\n  common/uloc.cpp in International Components for Unicode (ICU) for C/C++\n  did not ensure that there is a \u0027\\0\u0027 character at the end of a certain\n  temporary array, which allowed remote attackers to cause a denial of\n  service (out-of-bounds read) or possibly have unspecified other impact\n  via a call with a long httpAcceptLanguage argument (bsc#990636).\n- CVE-2017-7868: International Components for Unicode (ICU) for C/C++\n  2017-02-13 has an out-of-bounds write caused by a heap-based buffer\n  overflow related to the utf8TextAccess function in common/utext.cpp and\n  the utext_moveIndex32* function (bsc#1034674)\n- CVE-2017-7867: International Components for Unicode (ICU) for C/C++\n  2017-02-13 has an out-of-bounds write caused by a heap-based buffer\n  overflow related to the utf8TextAccess function in common/utext.cpp and\n  the utext_setNativeIndex* function (bsc#1034678)\n- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International\n  Components for Unicode (ICU) for C/C++ allowed remote attackers to\n  execute arbitrary code via a crafted string, aka a \u0027redundant UVector\n  entry clean up function call\u0027 issue (bnc#1067203)\n- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp\n  in International Components for Unicode (ICU) for C/C++ mishandled\n  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote\n  attackers to cause a denial of service (stack-based buffer overflow\n  and application crash) or possibly have unspecified other impact via a\n  crafted string, as demonstrated by ZNC  (bnc#1072193)\n- CVE-2017-15422: An integer overflow in icu during persian calendar\n  date processing could lead to incorrect years shown (bnc#1077999)\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-979",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1401-2.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2018:1401-2",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181401-2/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2018:1401-2",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1034674",
        "url": "https://bugzilla.suse.com/1034674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1034678",
        "url": "https://bugzilla.suse.com/1034678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1067203",
        "url": "https://bugzilla.suse.com/1067203"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1072193",
        "url": "https://bugzilla.suse.com/1072193"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1077999",
        "url": "https://bugzilla.suse.com/1077999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087932",
        "url": "https://bugzilla.suse.com/1087932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 929629",
        "url": "https://bugzilla.suse.com/929629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 990636",
        "url": "https://bugzilla.suse.com/990636"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8146 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8147 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8147/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-6293 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-6293/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14952 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14952/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15422 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15422/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17484 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17484/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7867 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7867/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7868 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7868/"
      }
    ],
    "title": "Security update for icu",
    "tracking": {
      "current_release_date": "2018-10-18T12:43:53Z",
      "generator": {
        "date": "2018-10-18T12:43:53Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2018:1401-2",
      "initial_release_date": "2018-10-18T12:43:53Z",
      "revision_history": [
        {
          "date": "2018-10-18T12:43:53Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libicu-doc-52.1-8.7.1.x86_64",
                "product": {
                  "name": "libicu-doc-52.1-8.7.1.x86_64",
                  "product_id": "libicu-doc-52.1-8.7.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu52_1-52.1-8.7.1.x86_64",
                "product": {
                  "name": "libicu52_1-52.1-8.7.1.x86_64",
                  "product_id": "libicu52_1-52.1-8.7.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu52_1-32bit-52.1-8.7.1.x86_64",
                "product": {
                  "name": "libicu52_1-32bit-52.1-8.7.1.x86_64",
                  "product_id": "libicu52_1-32bit-52.1-8.7.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libicu52_1-data-52.1-8.7.1.x86_64",
                "product": {
                  "name": "libicu52_1-data-52.1-8.7.1.x86_64",
                  "product_id": "libicu52_1-data-52.1-8.7.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu-doc-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64"
        },
        "product_reference": "libicu-doc-52.1-8.7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu52_1-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64"
        },
        "product_reference": "libicu52_1-52.1-8.7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu52_1-32bit-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64"
        },
        "product_reference": "libicu52_1-32bit-52.1-8.7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libicu52_1-data-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        },
        "product_reference": "libicu52_1-data-52.1-8.7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-8146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8146",
          "url": "https://www.suse.com/security/cve/CVE-2014-8146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066493 for CVE-2014-8146",
          "url": "https://bugzilla.suse.com/1066493"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910805 for CVE-2014-8146",
          "url": "https://bugzilla.suse.com/910805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 927951 for CVE-2014-8146",
          "url": "https://bugzilla.suse.com/927951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 929629 for CVE-2014-8146",
          "url": "https://bugzilla.suse.com/929629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959178 for CVE-2014-8146",
          "url": "https://bugzilla.suse.com/959178"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-8146"
    },
    {
      "cve": "CVE-2014-8147",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8147"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8147",
          "url": "https://www.suse.com/security/cve/CVE-2014-8147"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066493 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/1066493"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1079317 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/1079317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910805 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/910805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 910806 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/910806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 927951 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/927951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 929629 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/929629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959178 for CVE-2014-8147",
          "url": "https://bugzilla.suse.com/959178"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2014-8147"
    },
    {
      "cve": "CVE-2016-6293",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-6293"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a \u0027\\0\u0027 character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-6293",
          "url": "https://www.suse.com/security/cve/CVE-2016-6293"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1035111 for CVE-2016-6293",
          "url": "https://bugzilla.suse.com/1035111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2016-6293",
          "url": "https://bugzilla.suse.com/1123121"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 990636 for CVE-2016-6293",
          "url": "https://bugzilla.suse.com/990636"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-6293"
    },
    {
      "cve": "CVE-2017-14952",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14952"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a \"redundant UVector entry clean up function call\" issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14952",
          "url": "https://www.suse.com/security/cve/CVE-2017-14952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067203 for CVE-2017-14952",
          "url": "https://bugzilla.suse.com/1067203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2017-14952",
          "url": "https://bugzilla.suse.com/1123121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-14952"
    },
    {
      "cve": "CVE-2017-15422",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15422"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15422",
          "url": "https://www.suse.com/security/cve/CVE-2017-15422"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071691 for CVE-2017-15422",
          "url": "https://bugzilla.suse.com/1071691"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1077999 for CVE-2017-15422",
          "url": "https://bugzilla.suse.com/1077999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2017-15422",
          "url": "https://bugzilla.suse.com/1123121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-15422"
    },
    {
      "cve": "CVE-2017-17484",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17484"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17484",
          "url": "https://www.suse.com/security/cve/CVE-2017-17484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072193 for CVE-2017-17484",
          "url": "https://bugzilla.suse.com/1072193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2017-17484",
          "url": "https://bugzilla.suse.com/1123121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17484"
    },
    {
      "cve": "CVE-2017-7867",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7867"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7867",
          "url": "https://www.suse.com/security/cve/CVE-2017-7867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1034678 for CVE-2017-7867",
          "url": "https://bugzilla.suse.com/1034678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2017-7867",
          "url": "https://bugzilla.suse.com/1123121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-7867"
    },
    {
      "cve": "CVE-2017-7868",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7868"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7868",
          "url": "https://www.suse.com/security/cve/CVE-2017-7868"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1034674 for CVE-2017-7868",
          "url": "https://bugzilla.suse.com/1034674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123121 for CVE-2017-7868",
          "url": "https://bugzilla.suse.com/1123121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2018-10-18T12:43:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-7868"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…