Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2017-9814

Published: 17 July 2017

cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.

Notes

AuthorNote
mdeslaur
as of 2020-11-26, no complete fix from upstream
rodrigo-zaiden
upstream closed the issue on Jul/2021 with a merge
containing two other commits to complete the fix.

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
cairo
Launchpad, Ubuntu, Debian
bionic Needs triage

trusty Does not exist
(trusty was deferred [2020-11-26])
hirsute Ignored
(end of life)
groovy Ignored
(end of life)
focal Needs triage

jammy Needs triage

upstream
Released (1.17.6)
kinetic Ignored
(end of life, was needs-triage)
lunar Ignored
(end of life, was needs-triage)
artful Ignored
(end of life)
cosmic Ignored
(end of life)
disco Ignored
(end of life)
eoan Ignored
(end of life)
impish Ignored
(end of life)
xenial
Released (1.14.6-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
yakkety Ignored
(end of life)
zesty Ignored
(end of life)
mantic Needs triage

Patches:
other: https://bugs.freedesktop.org/attachment.cgi?id=132563
upstream: https://gitlab.freedesktop.org/cairo/cairo/-/commit/199823938780c8e50099b627d3e9137acba7a263
upstream: https://gitlab.freedesktop.org/cairo/cairo/-/commit/ae04679a08f39597907c28c317062b1f22ecf8f8
upstream: https://gitlab.freedesktop.org/cairo/cairo/-/commit/c91ae5c5a06d1b0f558f9a83637ba5df99cd2af5

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H