{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for icu","title":"Title of the patch"},{"category":"description","text":"icu was updated to fix two security issues.\n\nThese security issues were fixed:\n- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c\n  in the Unicode Bidirectional Algorithm implementation in ICU4C in\n  International Components for Unicode (ICU) used an integer data type\n  that is inconsistent with a header file, which allowed remote attackers\n  to cause a denial of service (incorrect malloc followed by invalid free)\n  or possibly execute arbitrary code via crafted text (bsc#929629).\n- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c\n  in the Unicode Bidirectional Algorithm implementation in ICU4C in\n  International Components for Unicode (ICU) did not properly track\n  directionally isolated pieces of text, which allowed remote attackers\n  to cause a denial of service (heap-based buffer overflow) or possibly\n  execute arbitrary code via crafted text (bsc#929629).\n- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in\n  common/uloc.cpp in International Components for Unicode (ICU) for C/C++\n  did not ensure that there is a '\\0' character at the end of a certain\n  temporary array, which allowed remote attackers to cause a denial of\n  service (out-of-bounds read) or possibly have unspecified other impact\n  via a call with a long httpAcceptLanguage argument (bsc#990636).\n- CVE-2017-7868: International Components for Unicode (ICU) for C/C++\n  2017-02-13 has an out-of-bounds write caused by a heap-based buffer\n  overflow related to the utf8TextAccess function in common/utext.cpp and\n  the utext_moveIndex32* function (bsc#1034674)\n- CVE-2017-7867: International Components for Unicode (ICU) for C/C++\n  2017-02-13 has an out-of-bounds write caused by a heap-based buffer\n  overflow related to the utf8TextAccess function in common/utext.cpp and\n  the utext_setNativeIndex* function (bsc#1034678)\n- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International\n  Components for Unicode (ICU) for C/C++ allowed remote attackers to\n  execute arbitrary code via a crafted string, aka a 'redundant UVector\n  entry clean up function call' issue (bnc#1067203)\n- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp\n  in International Components for Unicode (ICU) for C/C++ mishandled\n  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote\n  attackers to cause a denial of service (stack-based buffer overflow\n  and application crash) or possibly have unspecified other impact via a\n  crafted string, as demonstrated by ZNC  (bnc#1072193)\n- CVE-2017-15422: An integer overflow in icu during persian calendar\n  date processing could lead to incorrect years shown (bnc#1077999)\n\n","title":"Description of the patch"},{"category":"details","text":"SUSE-SLE-SERVER-12-SP2-BCL-2018-979","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1401-2.json"},{"category":"self","summary":"URL for SUSE-SU-2018:1401-2","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181401-2/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2018:1401-2","url":"https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html"},{"category":"self","summary":"SUSE Bug 1034674","url":"https://bugzilla.suse.com/1034674"},{"category":"self","summary":"SUSE Bug 1034678","url":"https://bugzilla.suse.com/1034678"},{"category":"self","summary":"SUSE Bug 1067203","url":"https://bugzilla.suse.com/1067203"},{"category":"self","summary":"SUSE Bug 1072193","url":"https://bugzilla.suse.com/1072193"},{"category":"self","summary":"SUSE Bug 1077999","url":"https://bugzilla.suse.com/1077999"},{"category":"self","summary":"SUSE Bug 1087932","url":"https://bugzilla.suse.com/1087932"},{"category":"self","summary":"SUSE Bug 929629","url":"https://bugzilla.suse.com/929629"},{"category":"self","summary":"SUSE Bug 990636","url":"https://bugzilla.suse.com/990636"},{"category":"self","summary":"SUSE CVE CVE-2014-8146 page","url":"https://www.suse.com/security/cve/CVE-2014-8146/"},{"category":"self","summary":"SUSE CVE CVE-2014-8147 page","url":"https://www.suse.com/security/cve/CVE-2014-8147/"},{"category":"self","summary":"SUSE CVE CVE-2016-6293 page","url":"https://www.suse.com/security/cve/CVE-2016-6293/"},{"category":"self","summary":"SUSE CVE CVE-2017-14952 page","url":"https://www.suse.com/security/cve/CVE-2017-14952/"},{"category":"self","summary":"SUSE CVE CVE-2017-15422 page","url":"https://www.suse.com/security/cve/CVE-2017-15422/"},{"category":"self","summary":"SUSE CVE CVE-2017-17484 page","url":"https://www.suse.com/security/cve/CVE-2017-17484/"},{"category":"self","summary":"SUSE CVE CVE-2017-7867 page","url":"https://www.suse.com/security/cve/CVE-2017-7867/"},{"category":"self","summary":"SUSE CVE CVE-2017-7868 page","url":"https://www.suse.com/security/cve/CVE-2017-7868/"}],"title":"Security update for icu","tracking":{"current_release_date":"2018-10-18T12:43:53Z","generator":{"date":"2018-10-18T12:43:53Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2018:1401-2","initial_release_date":"2018-10-18T12:43:53Z","revision_history":[{"date":"2018-10-18T12:43:53Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libicu-doc-52.1-8.7.1.x86_64","product":{"name":"libicu-doc-52.1-8.7.1.x86_64","product_id":"libicu-doc-52.1-8.7.1.x86_64"}},{"category":"product_version","name":"libicu52_1-52.1-8.7.1.x86_64","product":{"name":"libicu52_1-52.1-8.7.1.x86_64","product_id":"libicu52_1-52.1-8.7.1.x86_64"}},{"category":"product_version","name":"libicu52_1-32bit-52.1-8.7.1.x86_64","product":{"name":"libicu52_1-32bit-52.1-8.7.1.x86_64","product_id":"libicu52_1-32bit-52.1-8.7.1.x86_64"}},{"category":"product_version","name":"libicu52_1-data-52.1-8.7.1.x86_64","product":{"name":"libicu52_1-data-52.1-8.7.1.x86_64","product_id":"libicu52_1-data-52.1-8.7.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 12 SP2-BCL","product":{"name":"SUSE Linux Enterprise Server 12 SP2-BCL","product_id":"SUSE Linux Enterprise Server 12 SP2-BCL","product_identification_helper":{"cpe":"cpe:/o:suse:sles-bcl:12:sp2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libicu-doc-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL","product_id":"SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64"},"product_reference":"libicu-doc-52.1-8.7.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP2-BCL"},{"category":"default_component_of","full_product_name":{"name":"libicu52_1-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL","product_id":"SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64"},"product_reference":"libicu52_1-52.1-8.7.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP2-BCL"},{"category":"default_component_of","full_product_name":{"name":"libicu52_1-32bit-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL","product_id":"SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64"},"product_reference":"libicu52_1-32bit-52.1-8.7.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP2-BCL"},{"category":"default_component_of","full_product_name":{"name":"libicu52_1-data-52.1-8.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL","product_id":"SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"},"product_reference":"libicu52_1-data-52.1-8.7.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP2-BCL"}]},"vulnerabilities":[{"cve":"CVE-2014-8146","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-8146"}],"notes":[{"category":"general","text":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-8146","url":"https://www.suse.com/security/cve/CVE-2014-8146"},{"category":"external","summary":"SUSE Bug 1066493 for CVE-2014-8146","url":"https://bugzilla.suse.com/1066493"},{"category":"external","summary":"SUSE Bug 910805 for CVE-2014-8146","url":"https://bugzilla.suse.com/910805"},{"category":"external","summary":"SUSE Bug 927951 for CVE-2014-8146","url":"https://bugzilla.suse.com/927951"},{"category":"external","summary":"SUSE Bug 929629 for CVE-2014-8146","url":"https://bugzilla.suse.com/929629"},{"category":"external","summary":"SUSE Bug 959178 for CVE-2014-8146","url":"https://bugzilla.suse.com/959178"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"important"}],"title":"CVE-2014-8146"},{"cve":"CVE-2014-8147","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-8147"}],"notes":[{"category":"general","text":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-8147","url":"https://www.suse.com/security/cve/CVE-2014-8147"},{"category":"external","summary":"SUSE Bug 1066493 for CVE-2014-8147","url":"https://bugzilla.suse.com/1066493"},{"category":"external","summary":"SUSE Bug 1079317 for CVE-2014-8147","url":"https://bugzilla.suse.com/1079317"},{"category":"external","summary":"SUSE Bug 910805 for CVE-2014-8147","url":"https://bugzilla.suse.com/910805"},{"category":"external","summary":"SUSE Bug 910806 for CVE-2014-8147","url":"https://bugzilla.suse.com/910806"},{"category":"external","summary":"SUSE Bug 927951 for CVE-2014-8147","url":"https://bugzilla.suse.com/927951"},{"category":"external","summary":"SUSE Bug 929629 for CVE-2014-8147","url":"https://bugzilla.suse.com/929629"},{"category":"external","summary":"SUSE Bug 959178 for CVE-2014-8147","url":"https://bugzilla.suse.com/959178"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"important"}],"title":"CVE-2014-8147"},{"cve":"CVE-2016-6293","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6293"}],"notes":[{"category":"general","text":"The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6293","url":"https://www.suse.com/security/cve/CVE-2016-6293"},{"category":"external","summary":"SUSE Bug 1035111 for CVE-2016-6293","url":"https://bugzilla.suse.com/1035111"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2016-6293","url":"https://bugzilla.suse.com/1123121"},{"category":"external","summary":"SUSE Bug 990636 for CVE-2016-6293","url":"https://bugzilla.suse.com/990636"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"moderate"}],"title":"CVE-2016-6293"},{"cve":"CVE-2017-14952","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-14952"}],"notes":[{"category":"general","text":"Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a \"redundant UVector entry clean up function call\" issue.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-14952","url":"https://www.suse.com/security/cve/CVE-2017-14952"},{"category":"external","summary":"SUSE Bug 1067203 for CVE-2017-14952","url":"https://bugzilla.suse.com/1067203"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2017-14952","url":"https://bugzilla.suse.com/1123121"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"moderate"}],"title":"CVE-2017-14952"},{"cve":"CVE-2017-15422","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-15422"}],"notes":[{"category":"general","text":"Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-15422","url":"https://www.suse.com/security/cve/CVE-2017-15422"},{"category":"external","summary":"SUSE Bug 1071691 for CVE-2017-15422","url":"https://bugzilla.suse.com/1071691"},{"category":"external","summary":"SUSE Bug 1077999 for CVE-2017-15422","url":"https://bugzilla.suse.com/1077999"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2017-15422","url":"https://bugzilla.suse.com/1123121"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"moderate"}],"title":"CVE-2017-15422"},{"cve":"CVE-2017-17484","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-17484"}],"notes":[{"category":"general","text":"The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-17484","url":"https://www.suse.com/security/cve/CVE-2017-17484"},{"category":"external","summary":"SUSE Bug 1072193 for CVE-2017-17484","url":"https://bugzilla.suse.com/1072193"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2017-17484","url":"https://bugzilla.suse.com/1123121"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"moderate"}],"title":"CVE-2017-17484"},{"cve":"CVE-2017-7867","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-7867"}],"notes":[{"category":"general","text":"International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-7867","url":"https://www.suse.com/security/cve/CVE-2017-7867"},{"category":"external","summary":"SUSE Bug 1034678 for CVE-2017-7867","url":"https://bugzilla.suse.com/1034678"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2017-7867","url":"https://bugzilla.suse.com/1123121"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"important"}],"title":"CVE-2017-7867"},{"cve":"CVE-2017-7868","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-7868"}],"notes":[{"category":"general","text":"International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-7868","url":"https://www.suse.com/security/cve/CVE-2017-7868"},{"category":"external","summary":"SUSE Bug 1034674 for CVE-2017-7868","url":"https://bugzilla.suse.com/1034674"},{"category":"external","summary":"SUSE Bug 1123121 for CVE-2017-7868","url":"https://bugzilla.suse.com/1123121"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Server 12 SP2-BCL:libicu-doc-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-32bit-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-52.1-8.7.1.x86_64","SUSE Linux Enterprise Server 12 SP2-BCL:libicu52_1-data-52.1-8.7.1.x86_64"]}],"threats":[{"category":"impact","date":"2018-10-18T12:43:53Z","details":"important"}],"title":"CVE-2017-7868"}]}