freetype is vulnerable to an out-of-bounds write. A malicious user can pass a cff
font file to the application to cause a heap-based buffer overflow that can lead to an out-of-bounds write. This can cause the application to crash or overwrite values in the heap.
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3bd79cc257499f1850a1bace21f3ae371e3b40f0
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
www.securityfocus.com/bid/97677
bugs.chromium.org/p/oss-fuzz/issues/detail?id=289
bugzilla.redhat.com/show_bug.cgi?id=1444895
security.gentoo.org/glsa/201706-14
www.oracle.com/security-alerts/cpuapr2020.html