{"id":"JLSEC-2025-171","summary":"A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_t...","details":"A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.","modified":"2025-11-03T00:04:44.667756Z","published":"2025-10-20T22:55:27.993Z","upstream":["CVE-2022-25309"],"database_specific":{"license":"CC-BY-4.0","sources":[{"url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-25309","imported":"2025-10-19T19:44:23.692Z","published":"2022-09-06T18:15:11.493Z","id":"CVE-2022-25309","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25309","modified":"2024-11-21T06:51:58.233Z"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2022-25309"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047896"},{"type":"WEB","url":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"},{"type":"WEB","url":"https://github.com/fribidi/fribidi/issues/182"}],"affected":[{"package":{"name":"FriBidi_jll","ecosystem":"Julia","purl":"pkg:julia/FriBidi_jll?uuid=559328eb-81f9-559d-9380-de523a88c83c"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.0.14+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-171.json"}}],"schema_version":"1.7.3"}