A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "cairo-perf-utils", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "cairo-perf-utils-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo-gobject2", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo-gobject2-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo-script-interpreter2", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo-script-interpreter2-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-dbg", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-dev", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-dev-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-doc", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-udeb", "binary_version": "1.14.6-1ubuntu0.1~esm1" }, { "binary_name": "libcairo2-udeb-dbgsym", "binary_version": "1.14.6-1ubuntu0.1~esm1" } ] }