Debian 10228 Published by

A fribidi security update has been released for Debian GNU/Linux 10 (Buster) to address a stack-based buffer overflow vulnerability.



- -------------------------------------------------------------------------
Debian Security Advisory DSA-4561-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 08, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : fribidi
CVE ID : CVE-2019-18397
Debian Bug : 944327

Alex Murray discovered a stack-based buffer overflow vulnerability in fribidi, an implementation of the Unicode Bidirectional Algorithm algorithm, which could result in denial of service or potentially the execution of arbitrary code, when processing a large number of unicode isolate directional characters.

For the stable distribution (buster), this problem has been fixed in version 1.0.5-3.1+deb10u1.

We recommend that you upgrade your fribidi packages.

For the detailed security status of fribidi please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/fribidi

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/