{"id":"MGASA-2019-0389","summary":"Updated libcroco packages fix security vulnerability","details":"Updated libcroco packages fix security vulnerabilities:\n\nHeap overflow (input: check end of input before reading a byte)\n(CVE-2017-7960).\n\nUndefined behavior (tknzr: support only max long rgb values)\n(CVE-2017-7961).\n\nDenial of service (memory allocation error) via a crafted CSS file\n(CVE-2017-8834).\n\nDenial of service (infinite loop and CPU consumption) via a crafted CSS\nfile (CVE-2017-8871).\n","modified":"2026-02-01T11:11:48.527892Z","published":"2019-12-15T18:03:05Z","related":["CVE-2017-7960","CVE-2017-7961","CVE-2017-8834","CVE-2017-8871"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0389.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21057"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2019-06/msg00092.html"}],"affected":[{"package":{"name":"libcroco","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libcroco?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.13-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0389.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}