Change logs for fribidi source package in Jammy

  • fribidi (1.0.8-2ubuntu3.1) jammy-security; urgency=medium
    
      * SECURITY UPDATE: Incorrect length checking in processing of line input
        could result in a stack buffer overflow, resulting in a crash or potential
        code execution.
        - debian/patches/CVE-2022-25308.patch: add checking to length of string
          buffer before processing in bin/fribidi-main.c
        - CVE-2022-25308
    
      * SECURITY UPDATE: Insufficient sanitization of input data to the CapRTL
        encoder could result in a heap buffer overflow, resulting in a crash or
        potential code execution.
        - debian/patches/CVE-2022-25309.patch: add checking and removal of
          dangerous characters before encoding stage, in
          lib/fribidi-char-sets-cap-rtl.c
        - CVE-2022-25309
    
      * SECURITY UPDATE: Incorrect handling of string pointer can result in a
        crash in fribidi_remove_bidi_marks().
        - debian/patches/CVE-2022-25310.patch: add checking for NULL strings,
          to avoid potential use-after-free in lib/fribidi.c
        - CVE-2022-25310
    
     -- Ray Veldkamp <email address hidden>  Tue, 26 Apr 2022 16:01:05 +1000
  • fribidi (1.0.8-2ubuntu3) jammy; urgency=medium
    
      * No-change rebuild for ppc64el baseline bump.
    
     -- Ɓukasz 'sil2100' Zemczak <email address hidden>  Wed, 23 Mar 2022 14:52:57 +0100
  • fribidi (1.0.8-2ubuntu2) impish; urgency=medium
    
      * No-change rebuild to build packages with zstd compression.
    
     -- Matthias Klose <email address hidden>  Thu, 07 Oct 2021 12:11:45 +0200