USN-5922-1: FriBidi vulnerabilities
6 March 2023
Several security issues were fixed in fribidi.
Releases
Packages
- fribidi - Free Implementation of the Unicode BiDi algorithm (utility)
Details
It was discovered that FriBidi incorrectly handled the processing of input
strings, resulting in memory corruption. An attacker could possibly use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could possibly
use this issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings. An attacker could possibly use this to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code. (CVE-2022-25310)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libfribidi-bin
-
0.19.7-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
libfribidi0
-
0.19.7-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5366-1: fribidi, libfribidi-dev, libfribidi0, libfribidi-bin
- USN-5366-2: fribidi, libfribidi-dev, libfribidi0, libfribidi-bin