The cr_input_new_from_uri function in cr-input.c in libcroco allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file. Upstream patch: https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 References: https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/
Created libcroco tracking bugs for this issue: Affects: fedora-all [bug 1445316] Created mingw-libcroco tracking bugs for this issue: Affects: fedora-all [bug 1445315]