[ALSA-2025:12083] Moderate: icu security update
Type:
security
Severity:
moderate
Release date:
2025-07-30
Description:
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 libicu-devel-67.1-10.el9_6.aarch64.rpm 2e093d1aec993f17a483b68eb22df69c44c9bcbcc0ce9f7ebbf0fbe6a948bd87
aarch64 icu-67.1-10.el9_6.aarch64.rpm 7d1a43b288948c02485e23c5ec5adfda875aba7f653b015d827cce5ecad3f430
aarch64 libicu-67.1-10.el9_6.aarch64.rpm a1447205f82a7e2a6dc07d3dbbe241ad60049258fafbd913cafe8361b0f01d3b
i686 libicu-67.1-10.el9_6.i686.rpm 6c17a50f5f698a2060975191ce8fef3ec872de7fdcd4874d6ff03a2b988e60b5
i686 libicu-devel-67.1-10.el9_6.i686.rpm 7749007566a3135ebecab4177c753b666d910949838b042158b2a261e7fac660
ppc64le libicu-devel-67.1-10.el9_6.ppc64le.rpm 1a718eba54e76cd7486211aed7b05d85ae676d40d1584e4473fddd94e908a280
ppc64le icu-67.1-10.el9_6.ppc64le.rpm 822a713506e0403f31eb90926d37a439a357fa92cd227e48aa72b6ed382ecf2d
ppc64le libicu-67.1-10.el9_6.ppc64le.rpm d43ad03df4d3f870ea8c0226bd1d5ac3456f077cf08c8b82dd395b9667571fb0
s390x libicu-67.1-10.el9_6.s390x.rpm 4f453ffc894a5340ac368be9f8a77b5d65670fd703ea25499163fec761066d98
s390x libicu-devel-67.1-10.el9_6.s390x.rpm ce34aebbebb834f54d50d6e30fbc2cd7c4971d3da8721778101b1cd680db491f
s390x icu-67.1-10.el9_6.s390x.rpm d2561d197fb98623480afb9c65818c1477c09d32df922487faf8d9154679d735
x86_64 libicu-devel-67.1-10.el9_6.x86_64.rpm 02588f237c80548cd6ff495d4e4ae5cbc4cad1ab21ad96da7a8ea0fc90b020b1
x86_64 icu-67.1-10.el9_6.x86_64.rpm 27eee4ecfe2e4fd13bd6ca4ef5ce5fe4a715bb1c6d75101c757e105659f86170
x86_64 libicu-67.1-10.el9_6.x86_64.rpm 6efa992f6387ea01b1f630c1804f09a7f0dd584d6207cb7b2d432cdc5ee74121
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.