buildroot/package/libfribidi
Francois Perrad 1529c26f60 package/libfribidi: security bump to version 1.0.12
Fixes the following security issues:

- CVE-2022-25308: A stack-based buffer overflow flaw was found in the
  Fribidi package.  This flaw allows an attacker to pass a specially crafted
  file to the Fribidi application, which leads to a possible memory leak or
  a denial of service.

- CVE-2022-25309: A heap-based buffer overflow flaw was found in the Fribidi
  package and affects the fribidi_cap_rtl_to_unicode() function of the
  fribidi-char-sets-cap-rtl.c file.  This flaw allows an attacker to pass a
  specially crafted file to the Fribidi application with the '--caprtl'
  option, leading to a crash and causing a denial of service

- CVE-2022-25310: A segmentation fault (SEGV) flaw was found in the Fribidi
  package and affects the fribidi_remove_bidi_marks() function of the
  lib/fribidi.c file.  This flaw allows an attacker to pass a specially
  crafted file to Fribidi, leading to a crash and causing a denial of
  service.

Signed-off-by: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 0f42b67077)
[Peter: mark as security bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-11-08 14:04:20 +01:00
..
Config.in
libfribidi.hash
libfribidi.mk