Fedora 36: mingw-fribidi 2022-6f961cba8c | LinuxSecurity.com
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-6f961cba8c
2022-04-05 14:26:23.137384
--------------------------------------------------------------------------------

Name        : mingw-fribidi
Product     : Fedora 36
Version     : 1.0.11
Release     : 4.fc36
URL         : https://github.com/fribidi/fribidi
Summary     : MinGW Windows fribidi library
Description :
MinGW Windows fribidi library.

--------------------------------------------------------------------------------
Update Information:

Backport patches for CVE-2022-{25308,25309,25310}.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar 28 2022 Sandro Mani  - 1.0.11-4
- Backport patches for CVE-2022-25310, CVE-2022-25309, CVE-2022-25308
* Fri Mar 25 2022 Sandro Mani  - 1.0.11-3
- Rebuild with mingw-gcc-12
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2067040 - CVE-2022-25308 mingw-fribidi: fribidi: Stack based buffer overflow [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2067040
  [ 2 ] Bug #2067042 - CVE-2022-25309 mingw-fribidi: fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2067042
  [ 3 ] Bug #2067046 - CVE-2022-25310 mingw-fribidi: fribidi: SEGV in fribidi_remove_bidi_marks [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2067046
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-6f961cba8c' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 36: mingw-fribidi 2022-6f961cba8c

April 5, 2022
Backport patches for CVE-2022-{25308,25309,25310}.

Summary

MinGW Windows fribidi library.

Update Information:

Backport patches for CVE-2022-{25308,25309,25310}.

Change Log

* Mon Mar 28 2022 Sandro Mani - 1.0.11-4 - Backport patches for CVE-2022-25310, CVE-2022-25309, CVE-2022-25308 * Fri Mar 25 2022 Sandro Mani - 1.0.11-3 - Rebuild with mingw-gcc-12

References

[ 1 ] Bug #2067040 - CVE-2022-25308 mingw-fribidi: fribidi: Stack based buffer overflow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2067040 [ 2 ] Bug #2067042 - CVE-2022-25309 mingw-fribidi: fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2067042 [ 3 ] Bug #2067046 - CVE-2022-25310 mingw-fribidi: fribidi: SEGV in fribidi_remove_bidi_marks [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2067046

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-6f961cba8c' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : mingw-fribidi
Product : Fedora 36
Version : 1.0.11
Release : 4.fc36
URL : https://github.com/fribidi/fribidi
Summary : MinGW Windows fribidi library

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.