DEBIAN-CVE-2021-47793

Source
https://security-tracker.debian.org/tracker/CVE-2021-47793
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-47793.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2021-47793
Upstream
Published
2026-01-16T00:16:23.207Z
Modified
2026-03-17T02:43:22.633600Z
Severity
  • 4.6 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Telegram Desktop 2.9.2 contains a denial of service vulnerability that allows attackers to crash the application by sending an oversized message payload. Attackers can generate a 9 million byte buffer and paste it into the messaging interface to trigger an application crash.

References

Affected packages

Debian:11 / telegram-desktop

Package

Name
telegram-desktop
Purl
pkg:deb/debian/telegram-desktop?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.6.1+ds-1
2.6.1+ds-1+deb11u1
2.9.0+ds-1
2.9.0+ds1-2
2.9.2+ds-1~bpo10+1
2.9.2+ds-1~bpo11+1
2.9.2+ds-1
3.*
3.1.1+ds-1~bpo10+1
3.1.1+ds-1~bpo11+1
3.1.1+ds-1~deb11u2
3.1.1+ds-1
3.1.8+ds-1
3.3.0+ds-1
3.3.0+ds-2
3.4.2+ds-1
3.4.3+ds-1~bpo11+1
3.4.3+ds-1
3.4.8+ds-1
3.5.2+ds-1~bpo11+1
3.5.2+ds-1
3.6.0+ds-1
3.6.1+ds-1
3.6.1+ds-2
3.6.1+ds-3
3.7.1+ds-1
3.7.3+ds-1
3.7.3+ds-2
4.*
4.0.2+ds-1
4.0.2+ds-2
4.1.0+ds-1
4.1.1+ds-1
4.2.0+ds-1
4.2.4+ds-1~bpo11+1
4.2.4+ds-1
4.3.1+ds-1~bpo11+1
4.3.1+ds-1
4.3.4+ds-1
4.3.4+ds-2
4.4.1+ds-1~bpo11+1
4.4.1+ds-1
4.5.3+ds-1~bpo11+1
4.5.3+ds-1
4.6.0+ds-1
4.6.2+ds-1
4.6.5+ds-1~bpo11+1
4.6.5+ds-1
4.6.5+ds-2
4.8.1+ds-1
4.8.1+ds-2~bpo11+1
4.8.1+ds-2~bpo12+1
4.8.1+ds-2
4.9.3+ds-1
4.9.7+ds-1
4.10.3+ds-1
4.10.3+ds-2
4.11.5+ds-1
4.11.8+ds-1
4.13.1+ds-1
4.14.3+ds-1
4.14.4+ds-1
4.14.9+ds-1
4.14.9+ds-1.1
5.*
5.7.2+ds-2~bpo13+1
5.7.2+ds-2
5.7.2+ds-3
5.7.2+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-47793.json"

Debian:12 / telegram-desktop

Package

Name
telegram-desktop
Purl
pkg:deb/debian/telegram-desktop?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.6.5+ds-2
4.8.1+ds-1
4.8.1+ds-2~bpo11+1
4.8.1+ds-2~bpo12+1
4.8.1+ds-2
4.9.3+ds-1
4.9.7+ds-1
4.10.3+ds-1
4.10.3+ds-2
4.11.5+ds-1
4.11.8+ds-1
4.13.1+ds-1
4.14.3+ds-1
4.14.4+ds-1
4.14.9+ds-1
4.14.9+ds-1.1
5.*
5.7.2+ds-2~bpo13+1
5.7.2+ds-2
5.7.2+ds-3
5.7.2+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-47793.json"

Debian:14 / telegram-desktop

Package

Name
telegram-desktop
Purl
pkg:deb/debian/telegram-desktop?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0.14-1
1.0.29-1
1.1.0-1
1.1.10-1
1.1.18-1
1.1.19-1
1.1.19-2
1.1.23-1~bpo9+1
1.1.23-1
1.1.23-2
1.1.23-3
1.2.1-1
1.2.1-2
1.2.6-1
1.2.6-2
1.2.15-1
1.2.17-1
1.3.7-1
1.3.10-1
1.3.10-2
1.3.14-1
1.4.0-1
1.5.2-1
1.5.4-1
1.5.8-1
1.5.11-1
1.7.0-1
1.7.14-1
1.8.2-1
1.8.2-2
1.8.4-1
1.8.8-1
1.8.15-1
1.8.15-2~bpo10+1
1.8.15-2
1.9.8~slim-1
1.9.14+ds-1
1.9.14+ds-2
1.9.21+ds-1
2.*
2.0.1+ds-1
2.1.0+ds-1
2.1.4+ds-1
2.1.5+ds-1
2.1.7+ds-1
2.1.7+ds-2
2.2.0+ds-1
2.2.0+ds-2~bpo10+1
2.2.0+ds-2
2.2.0+ds-3
2.2.0+ds-4
2.2.0+ds-5
2.5.8+ds-1
2.5.8+ds-2
2.6.1+ds-1~bpo10+1
2.6.1+ds-1
2.9.0+ds-1
2.9.0+ds1-2
2.9.2+ds-1~bpo10+1
2.9.2+ds-1~bpo11+1
2.9.2+ds-1
3.*
3.1.1+ds-1~bpo10+1
3.1.1+ds-1~bpo11+1
3.1.1+ds-1~deb11u2
3.1.1+ds-1
3.1.8+ds-1
3.3.0+ds-1
3.3.0+ds-2
3.4.2+ds-1
3.4.3+ds-1~bpo11+1
3.4.3+ds-1
3.4.8+ds-1
3.5.2+ds-1~bpo11+1
3.5.2+ds-1
3.6.0+ds-1
3.6.1+ds-1
3.6.1+ds-2
3.6.1+ds-3
3.7.1+ds-1
3.7.3+ds-1
3.7.3+ds-2
4.*
4.0.2+ds-1
4.0.2+ds-2
4.1.0+ds-1
4.1.1+ds-1
4.2.0+ds-1
4.2.4+ds-1~bpo11+1
4.2.4+ds-1
4.3.1+ds-1~bpo11+1
4.3.1+ds-1
4.3.4+ds-1
4.3.4+ds-2
4.4.1+ds-1~bpo11+1
4.4.1+ds-1
4.5.3+ds-1~bpo11+1
4.5.3+ds-1
4.6.0+ds-1
4.6.2+ds-1
4.6.5+ds-1~bpo11+1
4.6.5+ds-1
4.6.5+ds-2
4.8.1+ds-1
4.8.1+ds-2~bpo11+1
4.8.1+ds-2~bpo12+1
4.8.1+ds-2
4.9.3+ds-1
4.9.7+ds-1
4.10.3+ds-1
4.10.3+ds-2
4.11.5+ds-1
4.11.8+ds-1
4.13.1+ds-1
4.14.3+ds-1
4.14.4+ds-1
4.14.9+ds-1
4.14.9+ds-1.1
5.*
5.7.2+ds-2~bpo13+1
5.7.2+ds-2
5.7.2+ds-3
5.7.2+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-47793.json"