{"id":"UBUNTU-CVE-2017-7475","details":"Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.","modified":"2026-04-02T18:08:55.730430Z","published":"2017-05-19T20:29:00Z","upstream":["CVE-2017-7475"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7475"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-7475"}],"affected":[{"package":{"name":"cairo","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/cairo@1.14.6-1ubuntu0.1~esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.14.2-2ubuntu2","1.14.4-1","1.14.6-1","1.14.6-1ubuntu0.1~esm1","1.14.6-1ubuntu0.1~esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.14.6-1ubuntu0.1~esm2","binary_name":"cairo-perf-utils"},{"binary_version":"1.14.6-1ubuntu0.1~esm2","binary_name":"libcairo-gobject2"},{"binary_version":"1.14.6-1ubuntu0.1~esm2","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.14.6-1ubuntu0.1~esm2","binary_name":"libcairo2"},{"binary_version":"1.14.6-1ubuntu0.1~esm2","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}},{"package":{"name":"cairo","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/cairo@1.15.10-2ubuntu0.1+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.14.10-1ubuntu1","1.15.8-2","1.15.8-3","1.15.10-2","1.15.10-2ubuntu0.1","1.15.10-2ubuntu0.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.15.10-2ubuntu0.1+esm1","binary_name":"cairo-perf-utils"},{"binary_version":"1.15.10-2ubuntu0.1+esm1","binary_name":"libcairo-gobject2"},{"binary_version":"1.15.10-2ubuntu0.1+esm1","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.15.10-2ubuntu0.1+esm1","binary_name":"libcairo2"},{"binary_version":"1.15.10-2ubuntu0.1+esm1","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}},{"package":{"name":"cairo","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/cairo@1.16.0-4ubuntu1+esm1?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.16.0-4","1.16.0-4ubuntu1","1.16.0-4ubuntu1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.16.0-4ubuntu1+esm1","binary_name":"cairo-perf-utils"},{"binary_version":"1.16.0-4ubuntu1+esm1","binary_name":"libcairo-gobject2"},{"binary_version":"1.16.0-4ubuntu1+esm1","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.16.0-4ubuntu1+esm1","binary_name":"libcairo2"},{"binary_version":"1.16.0-4ubuntu1+esm1","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}},{"package":{"name":"cairo","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/cairo@1.16.0-5ubuntu2.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.16.0-5ubuntu1","1.16.0-5ubuntu2","1.16.0-5ubuntu2.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.16.0-5ubuntu2.1","binary_name":"cairo-perf-utils"},{"binary_version":"1.16.0-5ubuntu2.1","binary_name":"libcairo-gobject2"},{"binary_version":"1.16.0-5ubuntu2.1","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.16.0-5ubuntu2.1","binary_name":"libcairo2"},{"binary_version":"1.16.0-5ubuntu2.1","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}},{"package":{"name":"cairo","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/cairo@1.18.0-3build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.18.0-1","1.18.0-1ubuntu1","1.18.0-3","1.18.0-3build1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.18.0-3build1","binary_name":"libcairo-gobject2"},{"binary_version":"1.18.0-3build1","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.18.0-3build1","binary_name":"libcairo2"},{"binary_version":"1.18.0-3build1","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}},{"package":{"name":"cairo","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/cairo@1.18.4-1build1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.18.4-1","1.18.4-1build1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.18.4-1build1","binary_name":"libcairo-gobject2"},{"binary_version":"1.18.4-1build1","binary_name":"libcairo-script-interpreter2"},{"binary_version":"1.18.4-1build1","binary_name":"libcairo2"},{"binary_version":"1.18.4-1build1","binary_name":"libcairo2-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7475.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}