drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in rlottie
Name: |
Mehrere Probleme in rlottie |
|
ID: |
USN-7198-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS |
|
Datum: |
Mi, 15. Januar 2025, 06:39 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31315 |
|
Applikationen: |
rlottie |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============8789519211525063953== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------I3trrVX3WkOZx7ntwdYhiZqL"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------I3trrVX3WkOZx7ntwdYhiZqL Content-Type: multipart/mixed; boundary="------------leAUjyHyLnCr1gE22dB0QlO9"; protected-headers="v1" From: Nico Campuzano <nicolas.campuzano@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <f0e8e8d1-0c88-441e-89bf-933f01837a54@canonical.com> Subject: [USN-7198-1] rlottie vulnerabilities
--------------leAUjyHyLnCr1gE22dB0QlO9 Content-Type: multipart/mixed; boundary="------------r9b0KJUFCIHDKZuRKry6ke2L"
--------------r9b0KJUFCIHDKZuRKry6ke2L Content-Type: multipart/alternative; boundary="------------RAYDstnFaLiHyp7RVLtWCXVg"
--------------RAYDstnFaLiHyp7RVLtWCXVg Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7198-1 January 10, 2025
rlottie vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS - Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in rlottie.
Software Description: - rlottie: library for rendering vector based animations and art
Details:
Paolo Giai discovered a series of stack-based overflow vulnerabilities in the blit and gray_render_cubic functions of a custom fork of the rlottie library. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-31315, CVE-2021-31321)
Paolo Giai discovered a series of type confusion vulnerabilities in the VDasher constructor and the LOTCompLayerItem::LOTCompLayerItem function of a custom fork of the rlottie library. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-31317, CVE-2021-31318)
Paolo Giai discovered an integer overflow vulnerability in the LOTGradient::populate function of a custom fork of the rlottie library. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-31319)
Paolo Giai discovered a series of heap buffer overflow vulnerabilities in the VGradientCache::generateGradientColorTable and LOTGradient::populate functions of a custom fork of the rlottie library.
--------------RAYDstnFaLiHyp7RVLtWCXVg Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
<!DOCTYPE html> <html> <head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF= -8"> </head> <body> <p><span class=3D"im">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br> Ubuntu Security Notice USN-7198-1<br> January 10, 2025<br> <br> rlottie vulnerabilities<br> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<wbr>=3D=3D=3D=3D=3D=3D=3D=3D = =3D=3D=3D=3D=3D=3D<br> <br> A security issue affects these releases of Ubuntu and its derivatives:<br> <br> - Ubuntu 22.04 LTS<br> - Ubuntu 20.04 LTS<br> <br> Summary:<br> <br> Several security issues were fixed in rlottie.<br> <br> Software Description:<br> - rlottie: library for rendering vector based animations and art<= br> <br> Details:<br> <br> Paolo Giai discovered a series of stack-based overflow vulnerabilities in<br> the blit and gray_render_cubic functions of a custom fork of the rlottie<br> </span> library. An attacker could possibly use this issue to leak sensitive <br> information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04<span class=3D"im"><br> LTS. (CVE-2021-31315, CVE-2021-31321)<br> <br> Paolo Giai discovered a series of type confusion vulnerabilities in the<br> VDasher constructor and the <a class=3D"moz-txt-link-freetext" hr= ef=3D"LOTCompLayerItem::LOTCompLayer">LOTCompLayerItem::LOTCompLayer</a>< = wbr>Item function<br> of a custom fork of the rlottie library. An attacker could possibly use<br> </span> this issue to leak sensitive information. This issue only affected Ubuntu<span class=3D"im"><br> 20.04 LTS. (CVE-2021-31317, CVE-2021-31318)<br> <br> Paolo Giai discovered an integer overflow vulnerability in the <b= r> <a class=3D"moz-txt-link-freetext" href=3D"LOTGradient::populate"= >LOTGradient::populate</a> function of a custom fork of the rlottie library.<br> </span> An attacker could possibly use this issue to leak sensitive information.<span class=3D"im"><br> This issue only affected Ubuntu 20.04 LTS. (CVE-2021-31319)<br> <br> Paolo Giai discovered a series of heap buffer overflow vulnerabilities<br> in the <a class=3D"moz-txt-link-freetext" href=3D"VGradientCache:= :generateGradie">VGradientCache::generateGradie</a><wbr>ntColorTable and< = br> <a class=3D"moz-txt-link-freetext" href=3D"LOTGradient::populate"= >LOTGradient::populate</a> functions of a custom fork of the rlottie library.</span></p> </body> </html>
--------------RAYDstnFaLiHyp7RVLtWCXVg--
--------------r9b0KJUFCIHDKZuRKry6ke2L Content-Type: application/pgp-keys; name="OpenPGP_0x945CCA55E4D641EE.asc" Content-Disposition: attachment; filename="OpenPGP_0x945CCA55E4D641EE.asc" Content-Description: OpenPGP public key Content-Transfer-Encoding: quoted-printable
-----BEGIN PGP PUBLIC KEY BLOCK-----
xsFNBGczyMYBEADYxpX1o2OlzXE8GH0zFPOaJzN2NiNWihzpruUagrv+K0iOkVrk L2cZwyPS0LXr6ztuhey6UBt29e3gqmip0a6qsL9fSdpunElPu2pCf1hZjazOWYEd flenRp7gkvUz5xYypcXG3MpP5pfgOm8oRxXJE4yGuwsS/YsAd0XFfUEZCQZZiEpW cbo46e+EZocrnb1aDCzxyPhvlgYdEHfIsnthcBa9JRTgJfyEulba7mpu89NLTvE/ T4J9QTWrDfb8VAw5JOoMZTbP7S4Ve4NEnoXY5Tbh94JSQgn3p7RnYDbRy0hiXBZr BuzTU/Hd7Ogydg6vGCqs0AT2CoZXNwbiKXeg+08TQJkMLn91hTPyqcORPq8+ojuR y8uKb713n68ko7ZdxXV1J+JNE+wgFMW1uWwuQTLXP/w1FUtOGOTT/PRtcKs2dNAh IDF0TBcbTzfiCYsjAp/KlJMhFlWePg3Fq2KiXY0AEpcFVy/MgpdSVlMzgCVtmUCf J6oAI+so1QJ8sUaH/byXvrRSN3CEnlecwBmUFGSzFWj25NUP4HaVdengzudxBTPJ IyZx8kYtnwPRAMu1s4aa7eQ3iOA8NlU0YTccBdfnyvu8xd7zVd6U/dMeoBdpoH6O C6SBJhboGrplZQVmclAGufB5HEroQzgcQejWTZShArMOtud0fEbW0GY5MwARAQAB zTtOaWNvbGFzIENhbXB1emFubyBKaW1lbmV6IDxuaWNvbGFzLmNhbXB1emFub0Bj YW5vbmljYWwuY29tPsLBkQQTAQoAOxYhBCpdQmj56NkMuPwFPJRcylXk1kHuBQJn M8jGAhsDBQsJCAcCAiICBhUKCQgLAgQWAgMBAh4HAheAAAoJEJRcylXk1kHuPBEQ AK4SCs6z7l9RepNkOMa0UyEMpRqbPg2ozNPovttTOa1o0fsZP55/zoRO0JWrDtYN /ANpXoHn7hUrvmWNicN8NYosk7jfcojgcg+awQf9Y7+bWshaq01MbXnXjjbadpsK S4+6iJvD0R4Yb6dUtc4eTujCIdyUz62dvv8eL1Mv9fnPDDb44VVtBDb1G5CQHC3c TFZanIaUvVkxtvK3YW5DmoJCxgsX3IYI/uNRsW5PiVYZVIST+yWNtkavyty3EhgR qozDd+4TWi07DqJ5ZGeTvUboZLPhWWaflUc+BXzrcZl8EIbZxFrL4xZBeXyMYgKE Pti1dkbhuosiRHevxWb4pQucnBKsmA1l0JcVLba2Czl3d7pilATM3qjBhmXe4+cC jaBbWFsA2emLZArcI+nUywsUlgrgjDyn4EKBoMutxe9Z+NDahe9fgW06wjkY9NhY OdlOMvSvFvJsYbl9oTnCOaQ+LGi7p47hqROnVV677AMnDlXERMd6vDb8OKakuiqz 6aQ66UoU9x91lqBZUSQ1LOvGqvnCVgADGgnYBzZD4oqrirB8Uq0WLr/Inw+IHzOu 4+e2uHnd17YezkbU1KvGjjVbUMaG/ZIFSf9CSj7dCBBV/zHncXSmPYZoY+4HZvGh loUChaXBw4zLabvP4Y1+UovLBxHx7lINJUmhOnSD05XozsFNBGczyMYBEADZarOS 9ZAF00Q6uC+onnCCI7wEomVA1nopEmLXq6bqvYgoZP6VH9WGgd/N+coozYkVUT0w ZlhkLQrwYlipWYhkxJlLSmLaM+hCMTwj6MTF+GFpR5a1Wh0uflBZDR2Y+4aqx1pU bG6Xhhga3g5WBmQLrfisnOONbG0Xy8ngV1p4FbVez3iFyPxCSDq9Lf78HlR0HpGR NYkQcXBBnQ19iQAJN0+EUIwONNhytRcmnp4MpfdIFbefvF/JjYy7rpmpe8QaRT/d +QFZPVtCVfxwoxnz9nj3Ju3PneGJglAAnc/SyKxM4tXu+7U2zX4g9NxOT03sqVjl gGk/PhLZspjsZxsuuGi5+LBiZ97OGesd8vuOD4LGOhj05beIHuZ8Svt34EdTvyJz 3Pcz+CCbqPdX6ZRUszlPr1VLSgA2vr4UhMrmvK4vRC5HoLygbSvIQzqRPPmgiXCs +0G9GnmgOJtVwAfL4s7bmOwKBKeiEWAm+uyVKmJ8bRVFIxKnua6J+Ph0H47qvX0C bi81EY9XAIXyzdYFM3oboXXdFDDFX/OwPJAatbxJVZiYwChX/pj/pT3aThLhW1y5 zBP7V+4GG19q7AMUjsR+h7z46+v8+8NMHyx9fwEniscrP9txVPqrhqM/mqpplGTo FBvdnbhn5lLEUFokPnOM/uMVHB4ZZkLmygLqwQARAQABwsF2BBgBCgAgFiEEKl1C aPno2Qy4/AU8lFzKVeTWQe4FAmczyMYCGwwACgkQlFzKVeTWQe5UQBAAi4eG6e4G w5vLcDki2FVqah08xE5XJTAFg8Zc9dXrG/j2DD2FiPe+LMabiSQ93ZGxePIehSOx QmDdGsE1lYlWL2NdNDoPZkHMIGH5EgcxUyEIY8zTVKxO6WGsMY1B3el8aoWzdPST u+jjW6gBcuN3e3h9FKFz2eXRVGiD0YKGQo5WxJkRjjNWr8C9QUZmtI88Q/HRnV9j grTj/pHHQlqkfM8P97vSc+YhVeprRD3Jtz/zZHUQG2tWiWsH8XHz6/WD3FoQIJY+ gKxsxGPw3hRVNrdJrYihs0M3IJm1BRX19eYyo5kO6AMhPsdUHgG+IZeVEpVFmRkm NZOzj0PjBdTs3D7i8zAOyW/wFZsqVz/zwY9snryTZI2IkdMzUQBoeL7pDJDgJVoq YJMXQmUS53PrgNLWM1W+Nli28NNfCgQyX5u5/N7Dy9FfqjN5+Uc7jP1mfYp5W66a 4xrRjLvACn65hi9a0B1jfDLpS96Yh4DgZRaqp9yiYxcwfHcWonyluyysvv7qExkI bOwO4WVIygmoutFeJJh3JnhIZ+lnxBBQxdzTy7KwhzNgqKgE3rDMtUfq+Rym0yjM ReWdD/tRjKzJJWldXY681rlnEc7ELBRV25NckO68njNjeBG16D9IZJe5nVYP/ud7 3L0Qt9MsQJBHumRxTZ7yqg6740Pi8AVhXl0=3D =3D1C3W -----END PGP PUBLIC KEY BLOCK-----
--------------r9b0KJUFCIHDKZuRKry6ke2L--
--------------leAUjyHyLnCr1gE22dB0QlO9--
--------------I3trrVX3WkOZx7ntwdYhiZqL Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEKl1CaPno2Qy4/AU8lFzKVeTWQe4FAmeBLsAFAwAAAAAACgkQlFzKVeTWQe5n YBAAjdDicoKTj0J1uIU3ai37DACxUQTvOgtMZQ2Bey0qE/8rFis0BoIWfqjNIDs55BeV1cQf9fxL mDjbaPXeaBaP0wsZAflfT7AsKknRK+6kyWtzxfcXeVCoxhtlHp/LQ5tGi5lx2CjZ4Jkb+BuHRsEW AotohqrtSntA6b+2OCT7lgu2HPj1oLOgZqCF8qIMHhwkF7cq7Rd+EmGfTlpVZVQs3JVAT/Pnmq3Q q4sLNmzPEIAqpl0a9m4YCAtNC08GK/anhC5sJ6r8FjGRQwQ8AhvVrYO2DPnGm5MG3o+dr24IgL1E Aax74bb693Xq7Aw4WzLcxbia+H5YLWUwjJByjKZw3xpD2KByfsy4dEUBDhdMbKXSzzzTGQjRGC4P rgeJ5flzMYUTGV77oxWYeg4sB31notJZs2Wh+RfGFICUcA01O8Y81nCRXrg6A7MQLDU4SxkD9qFK Fu1bCkHhwQIF6T15Vh5YCUmod0dnEMmGJ0NuKum7YMNX4ZIfE7d4cwirv1+2D2sO/uWbPL8k6Hst Y6l8vhS8bq6U/40zfqS2N43oXFXT7/jGf+LqSgozLsKdFPb6yBBAJuKNyqAYUm13HKCcKEcyT98j WBDrEF3Ag6AB51zV+mGFkkDA/dPG2FKHeeYqgvJF/7auaGIwTpITDcAI2ikGtbceMfhxi41Ugj3c yRs= =TZRX -----END PGP SIGNATURE-----
--------------I3trrVX3WkOZx7ntwdYhiZqL--
--===============8789519211525063953== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============8789519211525063953==--
|
|
|
|