USN-5366-2: FriBidi vulnerabilities
27 April 2022
Several security issues were fixed in fribidi.
Releases
Packages
- fribidi - Free Implementation of the Unicode BiDi algorithm (utility)
Details
USN-5366-1 fixed several vulnerabilities in FriBidi. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that FriBidi incorrectly handled processing of input strings
resulting in memory corruption. An attacker could use this issue to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could use this
to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code. (CVE-2022-25310)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5366-1: libfribidi-bin, fribidi, libfribidi0, libfribidi-dev
- USN-5922-1: libfribidi-bin, fribidi, libfribidi0, libfribidi-dev