{"id":"USN-3227-1","summary":"icu vulnerabilities","details":"It was discovered that ICU incorrectly handled certain memory operations\nwhen processing data. If an application using ICU processed crafted data,\na remote attacker could possibly cause it to crash or potentially execute\narbitrary code with the privileges of the user invoking the program.\n","modified":"2026-04-22T09:33:25.633047Z","published":"2017-03-13T16:42:15Z","related":["UBUNTU-CVE-2014-9911","UBUNTU-CVE-2015-4844","UBUNTU-CVE-2016-0494","UBUNTU-CVE-2016-6293","UBUNTU-CVE-2016-7415"],"upstream":["CVE-2014-9911","CVE-2015-4844","CVE-2016-0494","CVE-2016-6293","CVE-2016-7415","UBUNTU-CVE-2014-9911","UBUNTU-CVE-2015-4844","UBUNTU-CVE-2016-0494","UBUNTU-CVE-2016-6293","UBUNTU-CVE-2016-7415"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3227-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9911"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4844"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-0494"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6293"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7415"}],"affected":[{"package":{"name":"icu","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/icu@52.1-3ubuntu0.5?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"52.1-3ubuntu0.5"}]}],"versions":["4.8.1.1-12ubuntu2","4.8.1.1-13+nmu1","4.8.1.1-13+nmu1ubuntu1","52.1-3","52.1-3ubuntu0.2","52.1-3ubuntu0.3","52.1-3ubuntu0.4"],"ecosystem_specific":{"binaries":[{"binary_name":"icu-devtools","binary_version":"52.1-3ubuntu0.5"},{"binary_name":"libicu52","binary_version":"52.1-3ubuntu0.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2014-9911","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2015-4844","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-0494","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6293","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-7415","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3227-1.json"}},{"package":{"name":"icu","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/icu@55.1-7ubuntu0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"55.1-7ubuntu0.1"}]}],"versions":["55.1-4ubuntu1","55.1-6ubuntu1","55.1-7"],"ecosystem_specific":{"binaries":[{"binary_name":"icu-devtools","binary_version":"55.1-7ubuntu0.1"},{"binary_name":"libicu55","binary_version":"55.1-7ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2015-4844","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-0494","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6293","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-7415","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3227-1.json"}}],"schema_version":"1.7.5"}