FreeType Multiple Integer Overflow Vulnerability (Linux)

Summary
This host has FreeType installed and is prone to Multiple Integer Overflow vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code in the context of the affected application. Impact Level: System/Application.
Solution
Apply fix from the below repositories, http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e ***** NOTE : Ignore this warning, if above mentioned patch is applied already. *****
Insight
Multiple integer overflows are due to inadequate validation of data passed into cff/cffload.c, sfnt/ttcmap.c and cff/cffload.c while processing specially crafted fonts.
Affected
FreeType version 2.3.9 and prior on Linux.
References