USN-3067-1: HarfBuzz vulnerabilities
24 August 2016
HarfBuzz could be made to crash or run programs as your login if it processed specially crafted data.
Releases
Packages
- harfbuzz - OpenType text shaping engine
Details
Kostya Serebryany discovered that HarfBuzz incorrectly handled memory. A
remote attacker could use this issue to cause HarfBuzz to crash, resulting
in a denial of service, or possibly execute arbitrary code. (CVE-2015-8947)
It was discovered that HarfBuzz incorrectly handled certain length checks.
A remote attacker could use this issue to cause HarfBuzz to crash,
resulting in a denial of service, or possibly execute arbitrary code.
This issue only applied to Ubuntu 16.04 LTS. (CVE-2016-2052)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
Ubuntu 14.04
After a standard system update you need to restart your session to make
all the necessary changes.
References
Related notices
- USN-2877-1: oxideqt-codecs-extra, oxideqmlscene, liboxideqtcore0, liboxideqtquick0, oxide-qt, oxideqt-chromedriver, oxideqt-codecs, liboxideqt-qmlplugin