{"id":"CVE-2022-25309","details":"A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.","modified":"2026-04-16T00:01:35.111434736Z","published":"2022-09-06T18:15:11.493Z","related":["ALSA-2022:7514","ALSA-2022:8011","SUSE-SU-2022:1844-1","SUSE-SU-2022:1845-1","SUSE-SU-2022:1898-1","SUSE-SU-2022:2029-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-25309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047896"},{"type":"FIX","url":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"},{"type":"EVIDENCE","url":"https://github.com/fribidi/fribidi/issues/182"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fribidi/fribidi","events":[{"introduced":"0"},{"fixed":"6428d8469e536bcbb6e12c7b79ba6659371c435a"},{"fixed":"f22593b82b5d1668d1997dbccd10a9c31ffea3b3"}],"database_specific":{"cpe":"cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"1.0.12"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["0.19.4","0.19.5","0.19.6","0.19.7","FRIBIDI_0_19_1","v1.0.0","v1.0.1","v1.0.10","v1.0.11","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-25309.json","vanir_signatures_modified":"2026-04-12T04:42:05Z","vanir_signatures":[{"source":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3","signature_type":"Line","digest":{"line_hashes":["195929187198682414254044189776245323940","192186857396851327318030455048936161433","78482243105926605707148988574504835089","307809941047441329916853161326584498925"],"threshold":0.9},"signature_version":"v1","deprecated":false,"id":"CVE-2022-25309-6b1a0181","target":{"file":"lib/fribidi-char-sets-cap-rtl.c"}},{"source":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3","signature_type":"Function","id":"CVE-2022-25309-d80ae002","signature_version":"v1","deprecated":false,"digest":{"function_hash":"303871518782851192660779115964107174272","length":1087},"target":{"function":"fribidi_cap_rtl_to_unicode","file":"lib/fribidi-char-sets-cap-rtl.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}