A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "cairo-perf-utils",
"binary_version": "1.14.6-1ubuntu0.1~esm1"
},
{
"binary_name": "libcairo-gobject2",
"binary_version": "1.14.6-1ubuntu0.1~esm1"
},
{
"binary_name": "libcairo-script-interpreter2",
"binary_version": "1.14.6-1ubuntu0.1~esm1"
},
{
"binary_name": "libcairo2",
"binary_version": "1.14.6-1ubuntu0.1~esm1"
},
{
"binary_name": "libcairo2-dev",
"binary_version": "1.14.6-1ubuntu0.1~esm1"
}
]
}
{
"binaries": [
{
"binary_name": "cairo-perf-utils",
"binary_version": "1.15.10-2ubuntu0.1"
},
{
"binary_name": "libcairo-gobject2",
"binary_version": "1.15.10-2ubuntu0.1"
},
{
"binary_name": "libcairo-script-interpreter2",
"binary_version": "1.15.10-2ubuntu0.1"
},
{
"binary_name": "libcairo2",
"binary_version": "1.15.10-2ubuntu0.1"
},
{
"binary_name": "libcairo2-dev",
"binary_version": "1.15.10-2ubuntu0.1"
}
]
}
{
"binaries": [
{
"binary_name": "cairo-perf-utils",
"binary_version": "1.16.0-4ubuntu1"
},
{
"binary_name": "libcairo-gobject2",
"binary_version": "1.16.0-4ubuntu1"
},
{
"binary_name": "libcairo-script-interpreter2",
"binary_version": "1.16.0-4ubuntu1"
},
{
"binary_name": "libcairo2",
"binary_version": "1.16.0-4ubuntu1"
},
{
"binary_name": "libcairo2-dev",
"binary_version": "1.16.0-4ubuntu1"
}
]
}