Количество 11
Количество 11
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ...
openSUSE-SU-2021:1655-1
Security update for fribidi
openSUSE-SU-2021:0763-1
Security update for fribidi
SUSE-SU-2021:1655-1
Security update for fribidi
GHSA-fcm8-q275-jqv2
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
ELSA-2019-4361
ELSA-2019-4361: fribidi security update (IMPORTANT)
ELSA-2019-4326
ELSA-2019-4326: fribidi security update (IMPORTANT)
BDU:2020-01328
Уязвимость функции fribidi_get_par_embedding_levels_ex() (lib/fribidi-bidi.c) библиотеки GNU FriBidi, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-18397 A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat. | CVSS3: 7.8 | 1% Низкий | около 6 лет назад | |
CVE-2019-18397 A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat. | CVSS3: 7.8 | 1% Низкий | больше 6 лет назад | |
CVE-2019-18397 A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat. | CVSS3: 7.8 | 1% Низкий | около 6 лет назад | |
CVE-2019-18397 A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ... | CVSS3: 7.8 | 1% Низкий | около 6 лет назад | |
openSUSE-SU-2021:1655-1 Security update for fribidi | 1% Низкий | больше 4 лет назад | ||
openSUSE-SU-2021:0763-1 Security update for fribidi | 1% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:1655-1 Security update for fribidi | 1% Низкий | больше 4 лет назад | ||
GHSA-fcm8-q275-jqv2 A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat. | 1% Низкий | больше 3 лет назад | ||
ELSA-2019-4361 ELSA-2019-4361: fribidi security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4326 ELSA-2019-4326: fribidi security update (IMPORTANT) | около 6 лет назад | |||
BDU:2020-01328 Уязвимость функции fribidi_get_par_embedding_levels_ex() (lib/fribidi-bidi.c) библиотеки GNU FriBidi, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код | CVSS3: 7.8 | 1% Низкий | около 6 лет назад |
Уязвимостей на страницу