A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidicaprtltounicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
[
{
"id": "CVE-2022-25309-6b1a0181",
"target": {
"file": "lib/fribidi-char-sets-cap-rtl.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"195929187198682414254044189776245323940",
"192186857396851327318030455048936161433",
"78482243105926605707148988574504835089",
"307809941047441329916853161326584498925"
],
"threshold": 0.9
},
"deprecated": false,
"signature_type": "Line",
"source": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"
},
{
"id": "CVE-2022-25309-d80ae002",
"target": {
"function": "fribidi_cap_rtl_to_unicode",
"file": "lib/fribidi-char-sets-cap-rtl.c"
},
"signature_version": "v1",
"digest": {
"length": 1087.0,
"function_hash": "303871518782851192660779115964107174272"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"
}
]