CVE-2025-5222

Publication date 27 May 2025

Last updated 15 September 2025


Ubuntu priority

Cvss 3 Severity Score

7.0 · High

Score breakdown

A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.

Read the notes from the security team

Why is this CVE low priority?

DoS in a command line tool only

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
icu 25.04 plucky
Vulnerable
24.10 oracular Ignored end of life, was deferred [2025-05-28]
24.04 LTS noble
Vulnerable
22.04 LTS jammy
Vulnerable
20.04 LTS focal
Vulnerable
18.04 LTS bionic
Vulnerable
16.04 LTS xenial
Vulnerable
14.04 LTS trusty
Vulnerable

Notes


mdeslaur

This is only a stack overflow issue in a command-line tool. Because of compiler hardening, this is likely a DoS only.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
icu

Severity score breakdown

Parameter Value
Base score 7.0 · High
Attack vector Local
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H