It was discovered that FriBidi incorrectly handled the processing of input strings, resulting in memory corruption. An attacker could possibly use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL unicode encoder, resulting in memory corruption. An attacker could possibly use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing marks from unicode strings. An attacker could possibly use this to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25310)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "0.19.7-1ubuntu0.1~esm1", "binary_name": "libfribidi-bin" }, { "binary_version": "0.19.7-1ubuntu0.1~esm1", "binary_name": "libfribidi-dev" }, { "binary_version": "0.19.7-1ubuntu0.1~esm1", "binary_name": "libfribidi0" }, { "binary_version": "0.19.7-1ubuntu0.1~esm1", "binary_name": "libfribidi0-udeb" } ] }