A buffer overflow in the fribidigetparembeddinglevels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
[
{
"digest": {
"line_hashes": [
"81998630060188356797033002215980650049",
"157692335296880058587528312676677773649",
"254617841547356102856284239003018292264",
"64856564019526216929120098957523904441"
],
"threshold": 0.9
},
"target": {
"file": "lib/fribidi-bidi.c"
},
"signature_type": "Line",
"id": "CVE-2019-18397-a4060ad7",
"signature_version": "v1",
"source": "https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568",
"deprecated": false
},
{
"digest": {
"length": 12887.0,
"function_hash": "306583254731306983363013813531174641007"
},
"target": {
"file": "lib/fribidi-bidi.c",
"function": "fribidi_get_par_embedding_levels_ex"
},
"signature_type": "Function",
"id": "CVE-2019-18397-dd25e494",
"signature_version": "v1",
"source": "https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568",
"deprecated": false
}
]