It was discovered that FriBidi incorrectly handled processing of input strings resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL unicode encoder, resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing marks from unicode strings, resulting in a crash. An attacker could use this to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25310)
{ "binaries": [ { "binary_name": "libfribidi-bin", "binary_version": "0.19.7-2ubuntu0.1" }, { "binary_name": "libfribidi-bin-dbgsym", "binary_version": "0.19.7-2ubuntu0.1" }, { "binary_name": "libfribidi-dev", "binary_version": "0.19.7-2ubuntu0.1" }, { "binary_name": "libfribidi0", "binary_version": "0.19.7-2ubuntu0.1" }, { "binary_name": "libfribidi0-dbgsym", "binary_version": "0.19.7-2ubuntu0.1" }, { "binary_name": "libfribidi0-udeb", "binary_version": "0.19.7-2ubuntu0.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libfribidi-bin", "binary_version": "1.0.8-2ubuntu0.1" }, { "binary_name": "libfribidi-bin-dbgsym", "binary_version": "1.0.8-2ubuntu0.1" }, { "binary_name": "libfribidi-dev", "binary_version": "1.0.8-2ubuntu0.1" }, { "binary_name": "libfribidi0", "binary_version": "1.0.8-2ubuntu0.1" }, { "binary_name": "libfribidi0-dbgsym", "binary_version": "1.0.8-2ubuntu0.1" }, { "binary_name": "libfribidi0-udeb", "binary_version": "1.0.8-2ubuntu0.1" } ], "availability": "No subscription required" }