{"id":"CVE-2022-25309","details":"A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.","modified":"2026-04-16T04:40:07.383991989Z","published":"2022-09-06T18:15:11.493Z","related":["ALSA-2022:7514","ALSA-2022:8011","SUSE-SU-2022:1844-1","SUSE-SU-2022:1845-1","SUSE-SU-2022:1898-1","SUSE-SU-2022:2029-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-25309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047896"},{"type":"FIX","url":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"},{"type":"EVIDENCE","url":"https://github.com/fribidi/fribidi/issues/182"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fribidi/fribidi","events":[{"introduced":"0"},{"fixed":"6428d8469e536bcbb6e12c7b79ba6659371c435a"},{"fixed":"f22593b82b5d1668d1997dbccd10a9c31ffea3b3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.12"}]}}],"versions":["0.19.4","0.19.5","0.19.6","0.19.7","FRIBIDI_0_19_1","v1.0.0","v1.0.1","v1.0.10","v1.0.11","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25309.json","vanir_signatures_modified":"2026-04-11T22:01:31Z","vanir_signatures":[{"source":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3","digest":{"line_hashes":["195929187198682414254044189776245323940","192186857396851327318030455048936161433","78482243105926605707148988574504835089","307809941047441329916853161326584498925"],"threshold":0.9},"signature_type":"Line","id":"CVE-2022-25309-6b1a0181","deprecated":false,"signature_version":"v1","target":{"file":"lib/fribidi-char-sets-cap-rtl.c"}},{"source":"https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3","digest":{"function_hash":"303871518782851192660779115964107174272","length":1087},"signature_type":"Function","id":"CVE-2022-25309-d80ae002","deprecated":false,"signature_version":"v1","target":{"file":"lib/fribidi-char-sets-cap-rtl.c","function":"fribidi_cap_rtl_to_unicode"}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}