CVE-2019-18397

Priority
Description
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in
lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause
a denial of service or possibly execute arbitrary code by delivering
crafted text content to a user, when this content is then rendered by an
application that uses FriBidi for text layout calculations. Examples
include any GNOME or GTK+ based application that uses Pango for text
layout, as this internally uses FriBidi for bidirectional text layout. For
example, the attacker can construct a crafted text file to be opened in
GEdit, or a crafted IRC message to be viewed in HexChat.
Assigned-to
amurray
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (0.19.2-1)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (0.19.6-1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (0.19.7-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.19.7-2)
Ubuntu 19.04 (Disco Dingo):released (1.0.5-3.1ubuntu0.19.04.1)
Ubuntu 19.10 (Eoan Ermine):released (1.0.5-3.1ubuntu0.19.10.1)
Ubuntu 20.04 (Focal Fossa):needed
Patches:
Upstream:https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568
More Information

Updated: 2019-11-13 21:14:29 UTC (commit f874c2948abb729ad223375b3031252b8217a64a)