Debian Security Advisory

DLA-2415-1 freetype -- LTS security update

Date Reported:
25 Oct 2020
Affected Packages:
freetype
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-15999.
More information:

Sergei Glazunov discovered a heap-based buffer overflow vulnerability in the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts may result in denial of service or the execution of arbitrary code.

For Debian 9 stretch, this problem has been fixed in version 2.6.3-3.2+deb9u2.

We recommend that you upgrade your freetype packages.

For the detailed security status of freetype please refer to its security tracker page at: https://security-tracker.debian.org/tracker/freetype

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS