{"id":"CVE-2017-15422","details":"Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.","modified":"2026-04-16T01:40:34.649527858Z","published":"2018-08-28T19:29:11.520Z","related":["SUSE-SU-2018:1401-1","SUSE-SU-2018:1401-2","SUSE-SU-2018:1602-1","openSUSE-SU-2017:3245-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:12948-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","extracted_events":[{"fixed":"63.0.3239.84"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"14.04"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"16.04"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"17.10"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]}]},"references":[{"type":"WEB","url":"https://crbug.com/774382"},{"type":"WEB","url":"https://usn.ubuntu.com/3610-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3401"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201801-03"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4150"},{"type":"ARTICLE","url":"https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/unicode-org/icu","events":[{"introduced":"0"},{"fixed":"89bae57bd0570109ca997e8b6b887f851b9c26e0"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*","extracted_events":[{"introduced":"0"},{"fixed":"60.1"}]}}],"versions":["last-cvs-commit","milestone-59-0-1","milestone-60-0-1","release-59-rc","release-60-rc"],"database_specific":{"vanir_signatures_modified":"2026-04-11T15:43:34Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-15422.json","vanir_signatures":[{"signature_type":"Line","deprecated":false,"id":"CVE-2017-15422-44666b9c","digest":{"threshold":0.9,"line_hashes":["265922437860161806218521412017495571064","61370861690590036444881588296541572373","21412699680533285001219682540977158554","78524948477440916061374536654646355814","66071699775431555534478414008159488241","314051153806869992058837242297794192105","18121896161909391091128965835462286211","78524948477440916061374536654646355814"]},"target":{"file":"icu4c/source/test/intltest/callimts.cpp"},"source":"https://github.com/unicode-org/icu/commit/89bae57bd0570109ca997e8b6b887f851b9c26e0","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"id":"CVE-2017-15422-a0eae682","digest":{"length":5436,"function_hash":"195989465204932975762316039963888273501"},"target":{"function":"CalendarLimitTest::doLimitsTest","file":"icu4c/source/test/intltest/callimts.cpp"},"source":"https://github.com/unicode-org/icu/commit/89bae57bd0570109ca997e8b6b887f851b9c26e0","signature_version":"v1"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}