harfbuzz is vulnerable to arbitrary code execution. A buffer over-read resulting from an inverted length check in hb-ot-font.cc
allows an attacker to crash the application and potentially obtain arbitrary code execution.
googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
lists.opensuse.org/opensuse-updates/2016-08/msg00070.html
rhn.redhat.com/errata/RHSA-2016-0072.html
www.securityfocus.com/bid/81812
www.securitytracker.com/id/1034801
www.ubuntu.com/usn/USN-2877-1
www.ubuntu.com/usn/USN-3067-1
code.google.com/p/chromium/issues/detail?id=544270
code.google.com/p/chromium/issues/detail?id=579625
github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
github.com/harfbuzz/harfbuzz/issues/143
security.gentoo.org/glsa/201701-76