{"id":"USN-2739-1","summary":"freetype vulnerabilities","details":"It was discovered that FreeType did not correctly handle certain malformed\nfont files. If a user were tricked into using a specially crafted font\nfile, a remote attacker could cause FreeType to crash or hang, resulting in\na denial of service, or possibly expose uninitialized memory.\n","modified":"2026-04-22T09:16:09.352285Z","published":"2015-09-10T16:54:13Z","related":["UBUNTU-CVE-2014-9745","UBUNTU-CVE-2014-9746","UBUNTU-CVE-2014-9747"],"upstream":["CVE-2014-9745","UBUNTU-CVE-2014-9745"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2739-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9745"},{"type":"REPORT","url":"https://launchpad.net/bugs/1449225"}],"affected":[{"package":{"name":"freetype","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/freetype@2.5.2-1ubuntu2.5?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.5.2-1ubuntu2.5"}]}],"versions":["2.4.12-0ubuntu1","2.5.0.1-0ubuntu2","2.5.1-1ubuntu1","2.5.1-1ubuntu2","2.5.1-2ubuntu1","2.5.2-1ubuntu1","2.5.2-1ubuntu2","2.5.2-1ubuntu2.1","2.5.2-1ubuntu2.2","2.5.2-1ubuntu2.3","2.5.2-1ubuntu2.4"],"ecosystem_specific":{"binaries":[{"binary_name":"freetype2-demos","binary_version":"2.5.2-1ubuntu2.5"},{"binary_name":"libfreetype6","binary_version":"2.5.2-1ubuntu2.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"Ubuntu","score":"low"}],"id":"CVE-2014-9745"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2739-1.json"}}],"schema_version":"1.7.5"}