It was discovered that FriBidi incorrectly handled processing of input strings resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL unicode encoder, resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing marks from unicode strings, resulting in a crash. An attacker could use this to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25310)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi-bin" }, { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi-bin-dbgsym" }, { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi-dev" }, { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi0" }, { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi0-dbgsym" }, { "binary_version": "0.19.7-2ubuntu0.1", "binary_name": "libfribidi0-udeb" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi-bin" }, { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi-bin-dbgsym" }, { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi-dev" }, { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi0" }, { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi0-dbgsym" }, { "binary_version": "1.0.8-2ubuntu0.1", "binary_name": "libfribidi0-udeb" } ] }