{"id":"MGASA-2016-0264","summary":"Updated harfbuzz packages fix security vulnerability","details":"Two memory access issues, including a heap-based buffer overflow\n(CVE-2015-8947) and incorrect table length check (CVE-2016-2052) could\nlead to a denial of service when rendering a crafted OpenType font.\n","modified":"2026-04-16T01:45:59.702755372Z","published":"2016-07-26T21:59:16Z","upstream":["CVE-2015-8947","CVE-2016-2052"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0264.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18971"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2016/07/17/8"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2016/07/19/2"}],"affected":[{"package":{"name":"harfbuzz","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/harfbuzz?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.36-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0264.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}