sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "freetype2-demos",
            "binary_version": "2.5.2-1ubuntu2.4"
        },
        {
            "binary_name": "libfreetype6",
            "binary_version": "2.5.2-1ubuntu2.4"
        },
        {
            "binary_name": "libfreetype6-dev",
            "binary_version": "2.5.2-1ubuntu2.4"
        }
    ]
}