Linux Security
    Linux Security
    Linux Security

    Debian: DSA-4561-1: fribidi security update

    Date
    834
    Posted By
    Alex Murray discovered a stack-based buffer overflow vulnerability in fribidi, an implementation of the Unicode Bidirectional Algorithm algorithm, which could result in denial of service or potentially the execution of arbitrary code, when processing a large number of unicode
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4561-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    November 08, 2019                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : fribidi
    CVE ID         : CVE-2019-18397
    Debian Bug     : 944327
    
    Alex Murray discovered a stack-based buffer overflow vulnerability in
    fribidi, an implementation of the Unicode Bidirectional Algorithm
    algorithm, which could result in denial of service or potentially the
    execution of arbitrary code, when processing a large number of unicode
    isolate directional characters.
    
    For the stable distribution (buster), this problem has been fixed in
    version 1.0.5-3.1+deb10u1.
    
    We recommend that you upgrade your fribidi packages.
    
    For the detailed security status of fribidi please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/fribidi
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"45","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.