sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "freetype2-demos",
"binary_version": "2.5.2-1ubuntu2.4"
},
{
"binary_name": "libfreetype6",
"binary_version": "2.5.2-1ubuntu2.4"
},
{
"binary_name": "libfreetype6-dev",
"binary_version": "2.5.2-1ubuntu2.4"
}
]
}