Name | CVE-2020-35492 |
Description | A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2518-1, ELA-340-1 |
Debian Bugs | 978658 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
cairo (PTS) | jessie, jessie (lts) | 1.14.0-2.1+deb8u3 | fixed |
stretch (security), stretch (lts), stretch | 1.14.8-1+deb9u1 | fixed | |
buster | 1.16.0-4+deb10u1 | fixed | |
bullseye | 1.16.0-5 | fixed | |
bookworm | 1.16.0-7 | fixed | |
sid, trixie | 1.18.2-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
cairo | source | jessie | 1.14.0-2.1+deb8u3 | ELA-340-1 | ||
cairo | source | stretch | 1.14.8-1+deb9u1 | DLA-2518-1 | ||
cairo | source | buster | 1.16.0-4+deb10u1 | |||
cairo | source | (unstable) | 1.16.0-5 | 978658 |
https://gitlab.freedesktop.org/cairo/cairo/-/issues/437
Introduced by: https://gitlab.freedesktop.org/cairo/cairo/-/commit/c986a7310bb06582b7d8a566d5f007ba4e5e75bf (1.12.12)
Fixed by: https://gitlab.freedesktop.org/cairo/cairo/-/commit/03a820b173ed1fdef6ff14b4468f5dbc02ff59be
Minor cleanup for test: https://gitlab.freedesktop.org/cairo/cairo/-/commit/8bc14a6bba3bc8a64ff0749c74d9b96305bf6429
Additional meson support (test): https://gitlab.freedesktop.org/cairo/cairo/-/commit/0677e0a94968447e132c69f58cb04e5377e0c828
https://bugzilla.redhat.com/show_bug.cgi?id=1898396