{"id":"AZL-10887","summary":"CVE-2022-25309 affecting package fribidi for versions less than 1.0.12-1","details":"A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.","modified":"2026-04-01T05:06:33.647316Z","published":"2022-09-06T18:15:11Z","upstream":["CVE-2022-25309"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25309"}],"affected":[{"package":{"name":"fribidi","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/fribidi"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.12-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-10887.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}