freetype2
Page content
- Author: Miklos Vajna
- Vulnerable: 2.4.2-1
- Unaffected: 2.4.2-2nexon1
Some vulnerabilities have been reported in FreeType, which can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library.
- An error exists in the “ft_var_readpackedpoints()” function in src/truetype/ttgxvar.c when processing TrueType GX fonts and can be exploited to cause a heap-based buffer overflow via a specially crafted font.
- An error within the “Ins_SHZ()” function in src/truetype/ttinterp.c when handling the “SHZ” bytecode instruction can be exploited to cause a crash and potentially execute arbitrary code via a specially crafted font.
- Bug Tracker URL: http://bugs.frugalware.org/task/4433