sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "freetype2-demos" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6-dev" }, { "binary_version": "2.5.2-1ubuntu2.4", "binary_name": "libfreetype6-udeb" } ] }