Source: libcroco Version: 0.6.8-3 Severity: important Tags: security upstream patch
Hi, the following vulnerabilities were published for libcroco. CVE-2017-7960[0]: | The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and | 0.6.12 allows remote attackers to cause a denial of service (heap-based | buffer over-read) via a crafted CSS file. CVE-2017-7961[1]: | The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and | 0.6.12 has an "outside the range of representable values of type long" | undefined behavior issue, which might allow remote attackers to cause a | denial of service (application crash) or possibly have unspecified | other impact via a crafted CSS file. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-7960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960 https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 [1] https://security-tracker.debian.org/tracker/CVE-2017-7961 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961 https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 Regards, Salvatore