pkgconf version 1.5.0 to 1.5.2 contains a Buffer Overflow vulnerability in dequote() that can result in dequote() function returns 1-byte allocation if initial length is 0, leading to buffer overflow. This attack appear to be exploitable via specially crafted .pc file. This vulnerability appears to have been fixed in 1.5.3. Upstream patch: https://git.dereferenced.org/pkgconf/pkgconf/pulls/3
pkgconf 1.5.3 has been in Fedora 29/Rawhide since the end of July: https://koji.fedoraproject.org/koji/buildinfo?buildID=1132595
Probably introduced via https://git.dereferenced.org/pkgconf/pkgconf/commit/b46bb93cd1fe221dc4d6ff5e3ce99feda4ea31f1