A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fribidi | Gnu | * | 1.0.12 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | fribidi-0:1.0.4-9.el8 | * |
Red Hat Enterprise Linux 9 | RedHat | fribidi-0:1.0.10-6.el9.2 | * |
Fribidi | Ubuntu | bionic | * |
Fribidi | Ubuntu | devel | * |
Fribidi | Ubuntu | esm-infra-legacy/trusty | * |
Fribidi | Ubuntu | esm-infra/xenial | * |
Fribidi | Ubuntu | focal | * |
Fribidi | Ubuntu | impish | * |
Fribidi | Ubuntu | jammy | * |
Fribidi | Ubuntu | trusty | * |
Fribidi | Ubuntu | trusty/esm | * |
Fribidi | Ubuntu | upstream | * |
Fribidi | Ubuntu | xenial | * |