{"id":"CVE-2019-18397","details":"A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.","modified":"2026-04-02T00:20:15.553186Z","published":"2019-11-13T14:15:10.287Z","related":["MGASA-2019-0325","SUSE-SU-2021:1655-1","openSUSE-SU-2021:0763-1","openSUSE-SU-2021:1655-1","openSUSE-SU-2024:10772-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5UJRTG32FDNI7T637Q6PZYL3UCRR5HR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFS3N6KKXPI6ATDNEUFRSLX7R6BOBNIP/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4361"},{"type":"ADVISORY","url":"https://marc.info/?l=oss-security&m=157322128105807&w=2"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2019-18397"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-41"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0291"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4326"},{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327"},{"type":"FIX","url":"https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fribidi/fribidi","events":[{"introduced":"d18badec88bca8f6f4149156ebe7f1c6467a7bd8"},{"last_affected":"aac3845708969b9c4bc2874edc4950123595b1b4"},{"fixed":"034c6e9a1d296286305f4cfd1e0072b879f52568"}],"database_specific":{"versions":[{"introduced":"1.0.0"},{"last_affected":"1.0.7"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"vanir_signatures":[{"signature_type":"Line","deprecated":false,"id":"CVE-2019-18397-a4060ad7","source":"https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568","target":{"file":"lib/fribidi-bidi.c"},"digest":{"threshold":0.9,"line_hashes":["81998630060188356797033002215980650049","157692335296880058587528312676677773649","254617841547356102856284239003018292264","64856564019526216929120098957523904441"]},"signature_version":"v1"},{"signature_type":"Function","deprecated":false,"id":"CVE-2019-18397-dd25e494","source":"https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568","target":{"file":"lib/fribidi-bidi.c","function":"fribidi_get_par_embedding_levels_ex"},"digest":{"function_hash":"306583254731306983363013813531174641007","length":12887},"signature_version":"v1"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-18397.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}