Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310833605
HistoryMar 04, 2024 - 12:00 a.m.

openSUSE: Security Advisory for icu73_2 (SUSE-SU-2023:3563-3)

2024-03-0400:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
opensuse
security advisory
icu73_2
suse-su-2023:3563-3
cve-2020-10531
cve-2020-21913
cvss
greenbone ag

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.3%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.833605");
  script_version("2024-05-16T05:05:35+0000");
  script_cve_id("CVE-2020-10531", "CVE-2020-21913");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-05-16 05:05:35 +0000 (Thu, 16 May 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-03-18 16:40:03 +0000 (Wed, 18 Mar 2020)");
  script_tag(name:"creation_date", value:"2024-03-04 07:11:48 +0000 (Mon, 04 Mar 2024)");
  script_name("openSUSE: Security Advisory for icu73_2 (SUSE-SU-2023:3563-3)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=(openSUSELeapMicro5\.3|openSUSELeapMicro5\.2|openSUSELeapMicro5\.4)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2023:3563-3");
  script_xref(name:"URL", value:"https://lists.opensuse.org/archives/list/[email protected]/thread/6M33OQADBFQSCDT77LC4Y5QISJTUZZHY");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'icu73_2'
  package(s) announced via the SUSE-SU-2023:3563-3 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for icu73_2 fixes the following issues:

  * Update to release 73.2

  * CLDR extends the support for short Chinese sort orders to cover some
      additional, required characters for Level 2. This is carried over into ICU
      collation.

  * ICU has a modified character conversion table, mapping some GB18030
      characters to Unicode characters that were encoded after GB18030-2005.

  * fixes builds where UCHAR_TYPE is re-defined such as libqt5-qtwebengine

  * Update to release 73.1

  * Improved Japanese and Korean short-text line breaking

  * Reduction of C++ memory use in date formatting

  * Update to release 72.1

  * Support for Unicode 15, including new characters, scripts, emoji, and
      corresponding API constants.

  * Support for CLDR 42 locale data with various additions and corrections.

  * Shift to tzdb 2022e. Pre-1970 data for a number of timezones has been
      removed.

  * bump library packagename to libicu71 to match the version.

  * update to 71.1:

  * updates to CLDR 41 locale data with various additions and corrections.

  * phrase-based line breaking for Japanese. Existing line breaking methods
      follow standards and conventions for body text but do not work well for
      short Japanese text, such as in titles and headings. This new feature is
      optimized for these use cases.

  * support for Hindi written in Latin letters (hi_Latn). The CLDR data for this
      increasingly popular locale has been significantly revised and expanded.
      Note that based on user expectations, hi_Latn incorporates a large amount of
      English, and can also be referred to as Hinglish.

  * time zone data updated to version 2022a. Note that pre-1970 data for a
      number of time zones has been removed, as has been the case in the upstream
      tzdata release since 2021b.

  * ICU-21793 Fix ucptrietest golden diff [bsc#1192935]

  * Update to release 70.1:

  * Unicode 14 (new characters, scripts, emoji, and API constants)

  * CLDR 40 (many additions and corrections)

  * Fixes for measurement unit formatting

  * Can now be built with up to C++20 compilers

  * ICU-21613 Fix undefined behaviour in ComplexUnitsConverter::applyRounder

  * Update to release 69.1

  * CLDR 39

  * For Norwegian, 'no' is back to being the canonical code, with 'nb' treated
      as equivalent. This aligns handling of Norwegian with other macro language
      codes.

  * Binary prefixes in measurement units (KiB, MiB, etc.)

  * Time zone offset ...

  Description truncated. Please see the references for more information.");

  script_tag(name:"affected", value:"'icu73_2' package(s) on openSUSE Leap Micro 5.2, openSUSE Leap Micro 5.3, openSUSE Leap Micro 5.4.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "openSUSELeapMicro5.3") {

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debuginfo", rpm:"icu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debuginfo", rpm:"icu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.3"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "openSUSELeapMicro5.2") {

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.2"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "openSUSELeapMicro5.4") {

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debuginfo", rpm:"icu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2", rpm:"libicu73_2~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-debuginfo", rpm:"libicu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debugsource", rpm:"icu73_2-debugsource~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"icu73_2-debuginfo", rpm:"icu73_2-debuginfo~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-bedata", rpm:"libicu73_2-bedata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libicu73_2-ledata", rpm:"libicu73_2-ledata~73.2~150000.1.3.1", rls:"openSUSELeapMicro5.4"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.3%