CVE-2021-31315

NameCVE-2021-31315
DescriptionTelegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rlottie (PTS)bullseye0.1+dfsg-2fixed
sid, trixie, bookworm0.1+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rlottiesource(unstable)(not affected)

Notes

- rlottie <not-affected> (Doesn't affect rlottie as packaged in Debian, bug #988885)
https://www.shielder.it/advisories/telegram-rlottie-blit-stack-buffer-overflow/

Search for package or bug name: Reporting problems