A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidicaprtltounicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
[ { "source": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3", "target": { "file": "lib/fribidi-char-sets-cap-rtl.c" }, "signature_type": "Line", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-25309-6b1a0181", "digest": { "line_hashes": [ "195929187198682414254044189776245323940", "192186857396851327318030455048936161433", "78482243105926605707148988574504835089", "307809941047441329916853161326584498925" ], "threshold": 0.9 } }, { "source": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3", "target": { "function": "fribidi_cap_rtl_to_unicode", "file": "lib/fribidi-char-sets-cap-rtl.c" }, "signature_type": "Function", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-25309-d80ae002", "digest": { "function_hash": "303871518782851192660779115964107174272", "length": 1087.0 } } ]