Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-25309
HistoryFeb 22, 2022 - 12:00 a.m.

CVE-2022-25309

2022-02-2200:00:00
ubuntu.com
ubuntu.com
9

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.3%

A heap-based buffer overflow flaw was found in the Fribidi package and
affects the fribidi_cap_rtl_to_unicode() function of the
fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a
specially crafted file to the Fribidi application with the ‘–caprtl’
option, leading to a crash and causing a denial of service.

Notes

Author Note
rayveldkamp For bionic affected function is in charset/fribidi-char-sets-cap-rtl.c
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfribidi< 0.19.7-2ubuntu0.1UNKNOWN
ubuntu20.04noarchfribidi< 1.0.8-2ubuntu0.1UNKNOWN
ubuntu21.10noarchfribidi< 1.0.8-2ubuntu2.1UNKNOWN
ubuntu22.04noarchfribidi< 1.0.8-2ubuntu3.1UNKNOWN
ubuntu16.04noarchfribidi< 0.19.7-1ubuntu0.1~esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.3%