Your submission was sent successfully! Close

CVE-2022-25309

Published: 22 February 2022

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

Notes

AuthorNote
rayveldkamp
For bionic affected function is in charset/fribidi-char-sets-cap-rtl.c
Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
fribidi
Launchpad, Ubuntu, Debian
bionic
Released (0.19.7-2ubuntu0.1)
focal
Released (1.0.8-2ubuntu0.1)
impish
Released (1.0.8-2ubuntu2.1)
jammy
Released (1.0.8-2ubuntu3.1)
trusty Ignored
(out of standard support)
upstream
Released (v1.0.12)
xenial Ignored
(out of standard support)
Patches:
upstream: https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3