Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the graysplitcubic function of their custom fork of the rlottie library. A remote attacker might be able to overwrite Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0~git20200305.a717479+dfsg-1ubuntu0.1~esm1", "binary_name": "librlottie-dev" }, { "binary_version": "0~git20200305.a717479+dfsg-1ubuntu0.1~esm1", "binary_name": "librlottie0-1" }, { "binary_version": "0~git20200305.a717479+dfsg-1ubuntu0.1~esm1", "binary_name": "librlottie0-1-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.1+dfsg-2ubuntu0.1", "binary_name": "librlottie-dev" }, { "binary_version": "0.1+dfsg-2ubuntu0.1", "binary_name": "librlottie0-1" }, { "binary_version": "0.1+dfsg-2ubuntu0.1", "binary_name": "librlottie0-1-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.1+dfsg-4.2", "binary_name": "librlottie-dev" }, { "binary_version": "0.1+dfsg-4.2", "binary_name": "librlottie0-1" }, { "binary_version": "0.1+dfsg-4.2", "binary_name": "librlottie0-1-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.1+dfsg-4ubuntu1", "binary_name": "librlottie-dev" }, { "binary_version": "0.1+dfsg-4ubuntu1", "binary_name": "librlottie0-1" }, { "binary_version": "0.1+dfsg-4ubuntu1", "binary_name": "librlottie0-1-dbgsym" } ] }