Download
| Alert*
oval:org.secpod.oval:def:602244
It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service via crafted font files. oval:org.secpod.oval:def:89045387 This update of the freetype2 library fixes two security issues: - An infinite loop in parse_encoding in t1load.c - Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix |