SB2022042623 - Ubuntu update for libcroco



SB2022042623 - Ubuntu update for libcroco

Published: April 26, 2022

Security Bulletin ID SB2022042623
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2017-7960)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the cr_input_new_from_uri function in cr-input.c in libcroco. A remote attacker can perform a denial of service (heap-based buffer over-read) via a crafted CSS file.


2) Buffer overflow (CVE-ID: CVE-2017-8834)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the "cr_tknzr_parse_comment" function, as defined in the "src/cr-tknzr.c" file. A remote attacker can persuade a user to access a CSS file that submits malicious input to the system, trigger memory corruption and cause a DoS condition on the affected system.


3) Resource management error (CVE-ID: CVE-2017-8871)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop and CPU consumption in the "cr_parser_parse_selector_core" function, as defined in the "src/cr-parser.c" file . A remote attacker can persuade a user to access a file that submits malicious input to the system and cause a DoS condition.


4) Resource exhaustion (CVE-ID: CVE-2020-12825)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources caused by excessive recursion in cr_parser_parse_any_core in cr-parser.c. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.