USN-5389-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5389-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5389-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5389-1
Related
Published
2022-04-26T14:05:43.341402Z
Modified
2022-04-26T14:05:43.341402Z
Summary
libcroco vulnerabilities
Details

It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-7960)

It was discovered that Libcroco was incorrectly handling invalid UTF-8 values when processing CSS files. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-8834, CVE-2017-8871)

It was discovered that Libcroco was incorrectly implementing recursion in one of its parsing functions, which could cause an infinite recursion loop and a stack overflow due to stack consumption. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-12825)

References

Affected packages

Ubuntu:Pro:16.04:LTS / libcroco

Package

Name
libcroco
Purl
pkg:deb/ubuntu/libcroco@0.6.11-1ubuntu0.1~esm1?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.11-1ubuntu0.1~esm1

Affected versions

0.*

0.6.8-3
0.6.9-1
0.6.10-1
0.6.11-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "libcroco-tools-dbgsym": "0.6.11-1ubuntu0.1~esm1",
            "libcroco-tools": "0.6.11-1ubuntu0.1~esm1",
            "libcroco3-dbgsym": "0.6.11-1ubuntu0.1~esm1",
            "libcroco3-dev": "0.6.11-1ubuntu0.1~esm1",
            "libcroco3": "0.6.11-1ubuntu0.1~esm1"
        }
    ]
}