FreeType is vulnerable to denial of service (DoS) attacks and other attacks. The library does not check if a font contains a glyph name, allowing a malicious user to send a font file to cause a heap-based buffer over-read. This can cause the application to crash.
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1load.c?h=VER-2-7&id=a660e3de422731b94d4a134d27555430cbb6fb39
git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
www.debian.org/security/2017/dsa-3839
www.securityfocus.com/bid/97405
www.securitytracker.com/id/1038090
www.securitytracker.com/id/1038201
bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
bugzilla.novell.com/show_bug.cgi?id=1028103
security.gentoo.org/glsa/201706-14
source.android.com/security/bulletin/2017-04-01
www.oracle.com/security-alerts/cpuapr2020.html