FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "freetype2-demos" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6-dev" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6-udeb" } ] }