DSA-4561-1 fribidi -- security update

Related Vulnerabilities: CVE-2019-18397  

Alex Murray discovered a stack-based buffer overflow vulnerability in fribidi, an implementation of the Unicode Bidirectional Algorithm algorithm, which could result in denial of service or potentially the execution of arbitrary code, when processing a large number of unicode isolate directional characters. For the stable distribution (buster), this problem has been fixed in version 1.0.5-3.1+deb10u1. We recommend that you upgrade your fribidi packages. For the detailed security status of fribidi please refer to its security tracker page at: https://security-tracker.debian.org/tracker/fribidi

Debian Security Advisory

DSA-4561-1 fribidi -- security update

Date Reported:
08 Nov 2019
Affected Packages:
fribidi
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 944327.
In Mitre's CVE dictionary: CVE-2019-18397.
More information:

Alex Murray discovered a stack-based buffer overflow vulnerability in fribidi, an implementation of the Unicode Bidirectional Algorithm algorithm, which could result in denial of service or potentially the execution of arbitrary code, when processing a large number of unicode isolate directional characters.

For the stable distribution (buster), this problem has been fixed in version 1.0.5-3.1+deb10u1.

We recommend that you upgrade your fribidi packages.

For the detailed security status of fribidi please refer to its security tracker page at: https://security-tracker.debian.org/tracker/fribidi