{"id":"USN-4305-1","summary":"icu vulnerability","details":"André Bargull discovered that ICU incorrectly handled certain strings.\nAn attacker could possibly use this issue to execute arbitrary code.\n","modified":"2026-02-10T04:41:48Z","published":"2020-03-17T12:54:42Z","related":["UBUNTU-CVE-2020-10531"],"upstream":["CVE-2020-10531","UBUNTU-CVE-2020-10531"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4305-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10531"}],"affected":[{"package":{"name":"icu","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/icu@52.1-3ubuntu0.8+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"52.1-3ubuntu0.8+esm1"}]}],"versions":["4.8.1.1-12ubuntu2","4.8.1.1-13+nmu1","4.8.1.1-13+nmu1ubuntu1","52.1-3","52.1-3ubuntu0.2","52.1-3ubuntu0.3","52.1-3ubuntu0.4","52.1-3ubuntu0.5","52.1-3ubuntu0.6","52.1-3ubuntu0.7","52.1-3ubuntu0.8"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"52.1-3ubuntu0.8+esm1","binary_name":"icu-devtools"},{"binary_version":"52.1-3ubuntu0.8+esm1","binary_name":"libicu-dev"},{"binary_version":"52.1-3ubuntu0.8+esm1","binary_name":"libicu52"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4305-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-10531"}]}}},{"package":{"name":"icu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/icu@55.1-7ubuntu0.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"55.1-7ubuntu0.5"}]}],"versions":["55.1-4ubuntu1","55.1-6ubuntu1","55.1-7","55.1-7ubuntu0.1","55.1-7ubuntu0.2","55.1-7ubuntu0.3","55.1-7ubuntu0.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"55.1-7ubuntu0.5","binary_name":"icu-devtools"},{"binary_version":"55.1-7ubuntu0.5","binary_name":"libicu-dev"},{"binary_version":"55.1-7ubuntu0.5","binary_name":"libicu55"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4305-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-10531"}]}}},{"package":{"name":"icu","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/icu@60.2-3ubuntu3.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"60.2-3ubuntu3.1"}]}],"versions":["57.1-6","59.1-3ubuntu1","60.1-1ubuntu2","60.2-1ubuntu1","60.2-3ubuntu1","60.2-3ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"60.2-3ubuntu3.1","binary_name":"icu-devtools"},{"binary_version":"60.2-3ubuntu3.1","binary_name":"libicu-dev"},{"binary_version":"60.2-3ubuntu3.1","binary_name":"libicu60"},{"binary_version":"60.2-3ubuntu3.1","binary_name":"libiculx60"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4305-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-10531"}]}}}],"schema_version":"1.7.3"}