CVE-2022-25309

NameCVE-2022-25309
DescriptionA heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2974-1
Debian Bugs1008793

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fribidi (PTS)buster1.0.5-3.1+deb10u2fixed
buster (security)1.0.5-3.1+deb10u1vulnerable
bullseye1.0.8-2+deb11u1fixed
bookworm1.0.8-2.1fixed
sid, trixie1.0.13-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fribidisourcestretch0.19.7-1+deb9u2DLA-2974-1
fribidisourcebuster1.0.5-3.1+deb10u2
fribidisourcebullseye1.0.8-2+deb11u1
fribidisource(unstable)1.0.8-2.11008793

Notes

https://github.com/fribidi/fribidi/issues/182
https://github.com/fribidi/fribidi/pull/185
https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3

Search for package or bug name: Reporting problems