A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:11888 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:12083 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:12331 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:12332 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:12333 | Vendor Advisory |
| https://access.redhat.com/security/cve/CVE-2025-5222 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2368600 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html | Mailing List |
Configurations
History
No history.
Information
Published : 2025-05-27 21:15
Updated : 2025-08-08 14:55
NVD link : CVE-2025-5222
Mitre link : CVE-2025-5222
CVE.ORG link : CVE-2025-5222
JSON object : View
Products Affected
unicode
- international_components_for_unicode
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
