Name | CVE-2021-31322 |
Description | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
rlottie (PTS) | bullseye | 0.1+dfsg-2 | fixed |
bookworm | 0.1+dfsg-4 | fixed | |
sid, trixie | 0.1+dfsg-4.2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
rlottie | source | (unstable) | (not affected) |
- rlottie <not-affected> (Doesn't affect rlottie as packaged in Debian, bug #988885)
https://www.shielder.it/advisories/telegram-rlottie-lotgradient-populate-heap-buffer-overflow/