This bug was fixed in the package freetype - 2.10.1-2ubuntu0.4

---------------
freetype (2.10.1-2ubuntu0.4) focal-security; urgency=medium

  * SECURITY UPDATE: OOB write via font subglyph structures parsing
    - debian/patches/CVE-2025-27363.patch: make sure limit doesn't overflow
      in src/truetype/ttgload.c.
    - CVE-2025-27363
  * SECURITY UPDATE: DoS in gvar table loading (LP: #2028863)
    - debian/patches/lp2028863-dos.patch: add better checks for loading
      gvar table in src/truetype/ttgxvar.c.
    - No CVE number

 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>  Fri, 14 Mar 2025
13:03:51 -0400

** Changed in: freetype (Ubuntu Focal)
       Status: Confirmed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-27363

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to freetype in Ubuntu.
https://bugs.launchpad.net/bugs/2028863

Title:
  Denial of service via gvar table loading

Status in freetype package in Ubuntu:
  Fix Released
Status in freetype source package in Trusty:
  New
Status in freetype source package in Xenial:
  New
Status in freetype source package in Bionic:
  New
Status in freetype source package in Focal:
  Fix Released

Bug description:
  focal and earlier need this commit to prevent a DoS:

  
https://gitlab.freedesktop.org/freetype/freetype/-/commit/216e077600a58346bb022d8409fd82e9d914a10a

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/2028863/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to