{"id":"CVE-2022-25308","details":"A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.","modified":"2026-04-11T12:39:22.334464Z","published":"2022-09-06T18:15:11.437Z","related":["ALSA-2022:7514","ALSA-2022:8011","MGASA-2022-0136","SUSE-SU-2022:1844-1","SUSE-SU-2022:1845-1","SUSE-SU-2022:1898-1","SUSE-SU-2022:2029-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}]}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-25308"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047890"},{"type":"FIX","url":"https://github.com/fribidi/fribidi/issues/181"},{"type":"EVIDENCE","url":"https://github.com/fribidi/fribidi/pull/184"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fribidi/fribidi","events":[{"introduced":"0"},{"fixed":"6428d8469e536bcbb6e12c7b79ba6659371c435a"}],"database_specific":{"cpe":"cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"1.0.12"}]}}],"versions":["0.19.4","0.19.5","0.19.6","0.19.7","FRIBIDI_0_19_1","v1.0.0","v1.0.1","v1.0.10","v1.0.11","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-25308.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}