[ALSA-2022:7514] Moderate: fribidi security update
Type:
security
Severity:
moderate
Release date:
2022-11-14
Description:
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 fribidi-devel-1.0.4-9.el8.aarch64.rpm 4ce2d526f2fc73bf0c49ac3945ee9422431bb387175c4c3a11fb3d06edbd83f9
aarch64 fribidi-1.0.4-9.el8.aarch64.rpm 97b7ed7a5cce078e84c9515c7350080104d5934bc2fd191e023030b34ac8baf7
i686 fribidi-devel-1.0.4-9.el8.i686.rpm 93c61c16d7aa0d71fd5ba1b768621150592607975d2ff7fa9569660ec934e3c1
i686 fribidi-1.0.4-9.el8.i686.rpm c4177bd56390029be9c02fb8b2fe927888044a142f11f7e08a232015a4edf3ca
ppc64le fribidi-devel-1.0.4-9.el8.ppc64le.rpm 10e402dc842c7b18e8bc0c6f9ac36a52b10d312f933f181a192cd05aef364c80
ppc64le fribidi-1.0.4-9.el8.ppc64le.rpm 9a5a5db6cc51b493c7dc51892f23fbee18d98d4f595a6ae9273b0a8d3e6c7e6c
s390x fribidi-1.0.4-9.el8.s390x.rpm 78aae8072d9000df17b5376ce5d2da70474566b704f05feb3e9578a7b1ae5609
s390x fribidi-devel-1.0.4-9.el8.s390x.rpm e5791ed5eca53582b6ff9492c4dd7652f1e7507eec8ad644c0dff84ac4634e2b
x86_64 fribidi-devel-1.0.4-9.el8.x86_64.rpm 582c9962875104eb7a371682ef05b58bdb7a4c7ceb674a930576cd17eab15949
x86_64 fribidi-1.0.4-9.el8.x86_64.rpm c4e39bfb5d2189b21e6785e79e213e3f5cf42e44a868cc55e741c7f8a75ba7d2
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.