ALAS2023-2023-074 --- freetypeID: oval:org.secpod.oval:def:19500064 | Date: (C)2023-06-12 (M)2024-03-06 |
Class: PATCH | Family: unix |
A heap buffer overflow leading to out-of-bounds write was found in freetype. Memory allocation based on truncated PNG width and height values allows for an out-of-bounds write to occur in application memory when an attacker supplies a specially crafted TTF file. A heap buffer overflow flaw was found in Freetype's sfnt_init_face function in the sfobjs.c file. The vulnerability occurs when creating a face with a strange file and invalid index. This flaw allows an attacker to read and modify a small amount of memory, causing the application to crash. A segmentation fault was found in the FreeType library. This flaw allows an attacker to attempt access to a memory location in a way that could cause an application to halt or crash, leading to a denial of service. A segmentation fault was found in FreeType's FT_Request_Size function in the ftobjs.c file. This flaw allows an attacker to access a memory location in a way that could cause an application to halt or crash, leading to a denial of service
Platform: |
Amazon Linux 2023 |