First published: Tue Aug 13 2024(Updated: )
It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2017-7960) It was discovered that Libcroco was incorrectly handling invalid UTF-8 values when processing CSS files. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-8834, CVE-2017-8871) It was discovered that Libcroco was incorrectly implementing recursion in one of its parsing functions, which could cause an infinite recursion loop and a stack overflow due to stack consumption. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-12825)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libcroco-tools | <0.6.13-1ubuntu0.1 | 0.6.13-1ubuntu0.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libcroco3 | <0.6.13-1ubuntu0.1 | 0.6.13-1ubuntu0.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libcroco-tools | <0.6.12-2ubuntu0.1~esm1 | 0.6.12-2ubuntu0.1~esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libcroco3 | <0.6.12-2ubuntu0.1~esm1 | 0.6.12-2ubuntu0.1~esm1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libcroco-tools | <0.6.8-2ubuntu1+esm1 | 0.6.8-2ubuntu1+esm1 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/libcroco3 | <0.6.8-2ubuntu1+esm1 | 0.6.8-2ubuntu1+esm1 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)