{"id":"USN-6958-1","summary":"libcroco vulnerabilities","details":"It was discovered that Libcroco was incorrectly accessing data structures\nwhen reading bytes from memory, which could cause a heap buffer overflow.\nAn attacker could possibly use this issue to cause a denial of service.\nThis issue only affected Ubuntu 14.04 LTS. (CVE-2017-7960)\n\nIt was discovered that Libcroco was incorrectly handling invalid UTF-8\nvalues when processing CSS files. An attacker could possibly use this\nissue to cause a denial of service. (CVE-2017-8834, CVE-2017-8871)\n\nIt was discovered that Libcroco was incorrectly implementing recursion in\none of its parsing functions, which could cause an infinite recursion\nloop and a stack overflow due to stack consumption. An attacker could\npossibly use this issue to cause a denial of service. (CVE-2020-12825)\n","modified":"2026-02-10T04:45:02Z","published":"2024-08-13T15:39:41Z","related":["UBUNTU-CVE-2017-7960","UBUNTU-CVE-2017-8834","UBUNTU-CVE-2017-8871","UBUNTU-CVE-2020-12825"],"upstream":["CVE-2017-7960","CVE-2017-8834","CVE-2017-8871","CVE-2020-12825","UBUNTU-CVE-2017-7960","UBUNTU-CVE-2017-8834","UBUNTU-CVE-2017-8871","UBUNTU-CVE-2020-12825"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6958-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7960"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8834"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8871"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12825"}],"affected":[{"package":{"name":"libcroco","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libcroco@0.6.8-2ubuntu1+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.8-2ubuntu1+esm1"}]}],"versions":["0.6.8-2","0.6.8-2ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libcroco-tools","binary_version":"0.6.8-2ubuntu1+esm1"},{"binary_name":"libcroco3","binary_version":"0.6.8-2ubuntu1+esm1"},{"binary_name":"libcroco3-dev","binary_version":"0.6.8-2ubuntu1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6958-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2017-7960","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-8834","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-8871","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12825","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}},{"package":{"name":"libcroco","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/libcroco@0.6.12-2ubuntu0.1~esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.12-2ubuntu0.1~esm1"}]}],"versions":["0.6.12-1","0.6.12-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libcroco-tools","binary_version":"0.6.12-2ubuntu0.1~esm1"},{"binary_name":"libcroco3","binary_version":"0.6.12-2ubuntu0.1~esm1"},{"binary_name":"libcroco3-dev","binary_version":"0.6.12-2ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6958-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2017-8834","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-8871","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12825","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}},{"package":{"name":"libcroco","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libcroco@0.6.13-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.6.13-1ubuntu0.1"}]}],"versions":["0.6.13-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libcroco-tools","binary_version":"0.6.13-1ubuntu0.1"},{"binary_name":"libcroco3","binary_version":"0.6.13-1ubuntu0.1"},{"binary_name":"libcroco3-dev","binary_version":"0.6.13-1ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6958-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2017-8834","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-8871","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12825","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}