First published: Fri Jan 28 2022(Updated: )
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU FriBidi | <1.0.12 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25309 is a heap-based buffer overflow vulnerability in the Fribidi package.
CVE-2022-25309 affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file.
The severity of CVE-2022-25309 is medium with a CVSS score of 5.5.
The GNU FriBidi version up to 1.0.12 and Redhat Enterprise Linux versions 8.0 and 9.0 are affected by CVE-2022-25309.
Update the affected software to a version that includes a fix for CVE-2022-25309.