In ft_open_face_internal of ftobjs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2023-21261 - High Severity Vulnerability
Vulnerable Library - freetypefreetype-2.10.4
A free, high-quality, and portable font engine
Library home page: https://sourceforge.net/projects/freetype/
Found in HEAD commit: e6580209fab1312cb824a455d2df99df8a9fb156
Found in base branch: main
Vulnerable Source Files (1)
/thirdparty/freetype/src/base/ftobjs.c
Vulnerability Details
In ft_open_face_internal of ftobjs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Publish Date: 2023-07-12
URL: CVE-2023-21261
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-21261
Release Date: 2023-07-12
Fix Resolution: android-13.0.0_r58
Step up your Open Source Security Game with Mend here