FreeType is vulnerable to an out-of-bounds write. This is caused by the t1_decoder_parse_charstrings
function in psaux/t1decode.c
receiving a malicious string. This can cause a heap-based buffer overflow that can lead to an out-of-bounds write.
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
www.debian.org/security/2017/dsa-3839
www.securityfocus.com/bid/99093
bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
bugzilla.novell.com/show_bug.cgi?id=1035807
github.com/1e1f/freetype/blob/50a3d0a4041b9e2586057662ea810bbad5b360c2/src/psaux/t1decode.c#L784
security.gentoo.org/glsa/201706-14
www.oracle.com/security-alerts/cpuapr2020.html
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html