DSA-4777-1 freetype -- security update

Related Vulnerabilities: CVE-2020-15999  

Sergei Glazunov discovered a heap-based buffer overflow vulnerability in the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts may result in denial of service or the execution of arbitrary code. For the stable distribution (buster), this problem has been fixed in version 2.9.1-3+deb10u2. We recommend that you upgrade your freetype packages. For the detailed security status of freetype please refer to its security tracker page at: https://security-tracker.debian.org/tracker/freetype

Debian Security Advisory

DSA-4777-1 freetype -- security update

Date Reported:
21 Oct 2020
Affected Packages:
freetype
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 972586.
In Mitre's CVE dictionary: CVE-2020-15999.
More information:

Sergei Glazunov discovered a heap-based buffer overflow vulnerability in the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts may result in denial of service or the execution of arbitrary code.

For the stable distribution (buster), this problem has been fixed in version 2.9.1-3+deb10u2.

We recommend that you upgrade your freetype packages.

For the detailed security status of freetype please refer to its security tracker page at: https://security-tracker.debian.org/tracker/freetype