MGASA-2016-0077

Source
https://advisories.mageia.org/MGASA-2016-0077.html
Import Source
https://advisories.mageia.org/MGASA-2016-0077.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0077
Related
Published
2016-02-17T19:06:01Z
Modified
2016-02-17T18:27:04Z
Summary
Updated graphite2/firefox packages fix security vulnerability
Details

Multiple vulnerabilities in the graphite2 font library can result in information disclosure, denial-of-service (application crashes), or code execution via out-of-bounds reads, a NULL pointer dereference, and a heap-based buffer overflow (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523, CVE-2016-1526).

Firefox includes a bundled copy of the graphite2 library, which has been updated in Firefox ESR 38.6.1.

References
Credits

Affected packages

Mageia:5 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
38.6.1-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
38.6.1-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / graphite2

Package

Name
graphite2
Purl
pkg:rpm/mageia/graphite2?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.5-1.mga5

Ecosystem specific

{
    "section": "core"
}