- Description
- A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.
- Source
- secalert@redhat.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secalert@redhat.com
- CWE-120
- Hype score
- Not currently trending
🚨 CVE-2025-5222 🔴 HIGH (7) 🏢 Red Hat - Red Hat Enterprise Linux 10 🏗️ None 🔗 https://t.co/A46tpRmemN 🔗 https://t.co/OCt4fzkF9a #CyberCron #VulnAlert #InfoSec https://t.co/XJ46xKbqXa
@cybercronai
29 May 2025
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security Alert: CVE-2025-5222: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Red Hat Red (CVE-2025-5222) https://t.co/LdxB3tEJTY
@offseq
28 May 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-5222 A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag f… https://t.co/cF154G6siC
@CVEnew
27 May 2025
300 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes