Bug 1166844 (CVE-2020-10531) - VUL-0: CVE-2020-10531: icu: ICU: Integer overflow in UnicodeString:doAppend()
Summary: VUL-0: CVE-2020-10531: icu: ICU: Integer overflow in UnicodeString:doAppend()
Status: RESOLVED FIXED
Alias: CVE-2020-10531
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/254847/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-10531:8.8:(AV...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-17 15:24 UTC by Hans Loehr
Modified: 2024-07-19 12:47 UTC (History)
8 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
gabriele.sonnu: needinfo? (qzhao)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Hans Loehr 2020-03-17 15:28:54 UTC
SLE15-Update: affected
  source/common/unistr.cpp: UnicodeString::doAppend() seems to contain the integer overflow

SLE12-Update and older: don't have doAppend()
Comment 3 Hans Loehr 2020-03-17 15:34:50 UTC
SLE10-SP3-Update: different (much older) implementation (icu-3.4),
                  but probably similar bug:
  source/common/unicode/unistr.h:
                  UnicodeString::append() just uses UnicodeString::doReplace()
                  therefore not directly affected, but
  source/common/unistr.cpp:
                  UnicodeString::doReplace() seems to be affected by a similar integer overflow

* SLE11-Update:
  SLE11-SP1-Update:
  SLE12-Update:
     same issue as in SLE10-SP3-Update
Comment 4 Hans Loehr 2020-03-17 15:40:19 UTC
In SLE15-Update UnicodeString::doReplace() has some overflow check,
so this second issue probably does not apply to SLE15.

However, this check is missing in older versions, which could mean that the integer overflow in doReplace() is indeed a problem in SLE10-SLE12.
Comment 5 Hans Loehr 2020-03-17 16:35:16 UTC
Summary:
All code streams seem to be affected by the integer overflow.
* SLE15: source/common/unistr.cpp: UnicodeString::doAppend()
* SLE12, 
  SLE11-SP1,
  SLE11,
  SLE10-SP3: source/common/unistr.cpp: UnicodeString::doReplace()
Comment 6 Hans Loehr 2020-03-19 17:18:58 UTC
Description:
An issue was discovered in International Components for Unicode (ICU) for
C/C++ through 66.1. An integer overflow, leading to a heap-based buffer
overflow, exists in the UnicodeString::doAppend() function in
common/unistr.cpp.
Comment 8 Swamp Workflow Management 2020-03-31 16:44:45 UTC
SUSE-SU-2020:0819-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1166844
CVE References: CVE-2020-10531
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    icu-60.2-3.9.1
SUSE Linux Enterprise Server 15-LTSS (src):    icu-60.2-3.9.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    icu-60.2-3.9.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    icu-60.2-3.9.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    icu-60.2-3.9.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    icu-60.2-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2020-04-05 22:13:18 UTC
openSUSE-SU-2020:0459-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1166844
CVE References: CVE-2020-10531
Sources used:
openSUSE Leap 15.1 (src):    icu-60.2-lp151.3.11.1
Comment 11 Swamp Workflow Management 2020-05-05 13:41:53 UTC
SUSE-SU-2020:1180-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1166844
CVE References: CVE-2020-10531
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    icu-52.1-8.10.1
SUSE OpenStack Cloud 8 (src):    icu-52.1-8.10.1
SUSE OpenStack Cloud 7 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP5 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP4 (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    icu-52.1-8.10.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    icu-52.1-8.10.1
SUSE Enterprise Storage 5 (src):    icu-52.1-8.10.1
HPE Helion Openstack 8 (src):    icu-52.1-8.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Marcus Meissner 2020-06-03 11:03:41 UTC
also referenced in nodejs security release.

https://groups.google.com/forum/?utm_medium=email&utm_source=footer#!msg/nodejs-sec/UMBIO87oLbM/QpGMqNAGBwAJ
Comment 15 OBSbugzilla Bot 2020-06-05 13:30:06 UTC
This is an autogenerated message for OBS integration:
This bug (1166844) was mentioned in
https://build.opensuse.org/request/show/811807 Factory / nodejs10
Comment 17 Swamp Workflow Management 2020-06-09 13:17:00 UTC
SUSE-SU-2020:1568-1: An update that solves four vulnerabilities and has one errata is now available.

Category: security (critical)
Bug References: 1162117,1166844,1166916,1172442,1172443
CVE References: CVE-2020-10531,CVE-2020-11080,CVE-2020-7598,CVE-2020-8174
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    nodejs10-10.21.0-1.21.1
SUSE Linux Enterprise Server 15-LTSS (src):    nodejs10-10.21.0-1.21.1
SUSE Linux Enterprise Module for Web Scripting 15-SP2 (src):    nodejs10-10.21.0-1.21.1
SUSE Linux Enterprise Module for Web Scripting 15-SP1 (src):    nodejs10-10.21.0-1.21.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    nodejs10-10.21.0-1.21.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    nodejs10-10.21.0-1.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Swamp Workflow Management 2020-06-09 16:15:35 UTC
SUSE-SU-2020:1575-1: An update that fixes four vulnerabilities is now available.

Category: security (critical)
Bug References: 1166844,1166916,1172442,1172443
CVE References: CVE-2020-10531,CVE-2020-11080,CVE-2020-7598,CVE-2020-8174
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs10-10.21.0-1.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 19 OBSbugzilla Bot 2020-06-09 16:40:06 UTC
This is an autogenerated message for OBS integration:
This bug (1166844) was mentioned in
https://build.opensuse.org/request/show/812980 Factory / nodejs10
Comment 21 Swamp Workflow Management 2020-07-08 13:21:42 UTC
SUSE-SU-2020:0819-2: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1166844
CVE References: CVE-2020-10531
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    icu-60.2-3.9.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 (src):    icu-60.2-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 22 Robert Frohl 2021-05-05 14:35:34 UTC
Seems to be missing for:
- SUSE:SLE-15-SP2:Update/icu
Comment 30 Maintenance Automation 2023-09-08 16:30:02 UTC
SUSE-SU-2023:3563-1: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed.

Category: security (moderate)
Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262
CVE References: CVE-2020-10531, CVE-2020-21913
Jira References: PED-4917, SLE-11118
Sources used:
SUSE Manager Retail Branch Server 4.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Manager Server 4.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.1 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): icu73_2-73.2-150000.1.3.1
openSUSE Leap 15.4 (src): icu73_2-73.2-150000.1.3.1
openSUSE Leap 15.5 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.4 (src): icu73_2-73.2-150000.1.3.1
Basesystem Module 15-SP4 (src): icu73_2-73.2-150000.1.3.1
Basesystem Module 15-SP5 (src): icu73_2-73.2-150000.1.3.1
SUSE Manager Proxy 4.2 (src): icu73_2-73.2-150000.1.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Maintenance Automation 2023-10-23 20:30:04 UTC
SUSE-SU-2023:3563-2: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed.

Category: security (moderate)
Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262
CVE References: CVE-2020-10531, CVE-2020-21913
Jira References: PED-4917, SLE-11118
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): icu73_2-73.2-150000.1.3.1
SUSE Enterprise Storage 7.1 (src): icu73_2-73.2-150000.1.3.1
SUSE Enterprise Storage 7 (src): icu73_2-73.2-150000.1.3.1
SUSE CaaS Platform 4.0 (src): icu73_2-73.2-150000.1.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 32 Maintenance Automation 2023-10-30 20:30:04 UTC
SUSE-SU-2023:3563-3: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed.

Category: security (moderate)
Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262
CVE References: CVE-2020-10531, CVE-2020-21913
Jira References: PED-4917, SLE-11118
Sources used:
SUSE Manager Retail Branch Server 4.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Manager Server 4.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.1 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.2 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): icu73_2-73.2-150000.1.3.1
openSUSE Leap Micro 5.2 (src): icu73_2-73.2-150000.1.3.1
openSUSE Leap Micro 5.3 (src): icu73_2-73.2-150000.1.3.1
openSUSE Leap Micro 5.4 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.3 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): icu73_2-73.2-150000.1.3.1
SUSE Linux Enterprise Micro 5.4 (src): icu73_2-73.2-150000.1.3.1
Basesystem Module 15-SP4 (src): icu73_2-73.2-150000.1.3.1
Basesystem Module 15-SP5 (src): icu73_2-73.2-150000.1.3.1
SUSE Manager Proxy 4.2 (src): icu73_2-73.2-150000.1.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Andrea Mattiazzo 2024-07-19 12:47:00 UTC
All done, closing.