First published: Fri Jan 28 2022(Updated: )
A stack based buffer overflow was found in fribidi. References: <a href="https://github.com/fribidi/fribidi/issues/181">https://github.com/fribidi/fribidi/issues/181</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU FriBidi | <1.0.12 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25308 is a stack-based buffer overflow vulnerability found in the Fribidi package.
The severity of CVE-2022-25308 is high with a CVSS score of 7.8.
CVE-2022-25308 allows an attacker to pass a specially crafted file to the Fribidi application, which can result in a possible memory leak or a denial of service.
GNU FriBidi version up to and excluding 1.0.12, Redhat Enterprise Linux 8.0, and Redhat Enterprise Linux 9.0 are affected by CVE-2022-25308.
Apply the latest patches or updates provided by the vendor.