UbuntuUpdates.org

Package "harfbuzz"

Name: harfbuzz

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • OpenType text shaping engine (GObject introspection data)
  • Development files for OpenType text shaping engine
  • Documentation files for the HarfBuzz library
  • OpenType text shaping engine ICU backend (GObject library)

Latest version: 2.7.4-1ubuntu3.2
Release: jammy (22.04)
Level: security
Repository: main

Links



Other versions of "harfbuzz" in Jammy

Repository Area Version
base main 2.7.4-1ubuntu3
base universe 2.7.4-1ubuntu3
security universe 2.7.4-1ubuntu3.2
updates main 2.7.4-1ubuntu3.2
updates universe 2.7.4-1ubuntu3.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.7.4-1ubuntu3.2 2025-02-03 17:06:54 UTC

  harfbuzz (2.7.4-1ubuntu3.2) jammy-security; urgency=medium

  * SECURITY UPDATE: resource consumption via consecutive marks
    - debian/patches/CVE-2023-25193-pre1.patch: refactor
      skippy_iter.match() in src/hb-ot-layout-gsubgpos.hh.
    - debian/patches/CVE-2023-25193-1.patch: avoid O(n^2) behavior in
      mark-attachment in src/hb-ot-layout-gsubgpos.hh,
      src/hb-ot-layout-gpos-table.hh.
    - debian/patches/CVE-2023-25193-2.patch: optimize
      _infos_set_glyph_flags to avoid O(n^2) behavior in src/hb-buffer.hh.
    - debian/patches/CVE-2023-25193-3.patch: fix up previous commit in
      src/hb-buffer.hh.
    - debian/patches/CVE-2023-25193-4.patch: fix assert fail introduced
      recently in src/hb-ot-layout-gpos-table.hh.
    - CVE-2023-25193

 -- Marc Deslauriers <email address hidden> Thu, 30 Jan 2025 13:07:47 -0500

Source diff to previous version
CVE-2023-25193 hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back

Version: 2.7.4-1ubuntu3.1 2022-07-19 14:06:19 UTC

  harfbuzz (2.7.4-1ubuntu3.1) jammy-security; urgency=medium

  * SECURITY UPDATE: DoS via integer overflow
    - debian/patches/CVE-2022-33068-1.patch: limit glyph extents in
      src/hb-ot-color-sbix-table.hh.
    - debian/patches/CVE-2022-33068-2.patch: fix conditional in
      src/hb-ot-color-sbix-table.hh.
    - CVE-2022-33068

 -- Marc Deslauriers <email address hidden> Wed, 13 Jul 2022 12:40:13 -0400

CVE-2022-33068 An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified v



About   -   Send Feedback to @ubuntu_updates