CVE-2020-10531
Publication date 12 March 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
18.04 LTS bionic |
Fixed 80.0.3987.149-0ubuntu0.18.04.1
|
|
16.04 LTS xenial |
Fixed 80.0.3987.149-0ubuntu0.16.04.1
|
|
14.04 LTS trusty | Not in release | |
icu | ||
18.04 LTS bionic |
Fixed 60.2-3ubuntu3.1
|
|
16.04 LTS xenial |
Fixed 55.1-7ubuntu0.5
|
|
14.04 LTS trusty |
Fixed 52.1-3ubuntu0.8+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
leosilva
According with debian versions bellow 52.1.8 are not affected because code is not present, though, it needs further confirmation. keep precise/trusty as needs-triage.
mdeslaur
in xenial and older releases, vulnerable code looks to be in UnicodeString::doReplace, need to investigate
leosilva
doAppend was write based on doReplace, that originally shipped the vul code more info, check commit 3d77fc18b8b. Marking precise/trusty as needed.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4305-1
- ICU vulnerability
- 17 March 2020