[USN-5366-2] FriBidi vulnerabilities


========================================================================== Ubuntu Security Notice USN-5366-2 April 27, 2022
fribidi vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in fribidi.
Software Description: – fribidi: Free Implementation of the Unicode BiDi algorithm (utility)
Details:
USN-5366-1 fixed several vulnerabilities in FriBidi. This update provides the corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that FriBidi incorrectly handled processing of input strings resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL unicode encoder, resulting in memory corruption. An attacker could use this issue to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing marks from unicode strings, resulting in a crash. An attacker could use this to cause FriBidi to crash, resulting in a denial of service, or potentially execute arbitrary code. (CVE-2022-25310)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: libfribidi-bin 1.0.8-2ubuntu3.1 libfribidi-dev 1.0.8-2ubuntu3.1 libfribidi0 1.0.8-2ubuntu3.1
In general, a standard system update will make all the necessary changes.
References: ubuntu.com/security/notices/USN-5366-2 ubuntu.com/security/notices/USN-5366-1 CVE-2022-25308, CVE-2022-25309, CVE-2022-25310
Package Information: launchpad.net/ubuntu/+source/fribidi/1.0.8-2ubuntu3.1