CVE-2015-9290
Published: July 30, 2019Last modified: November 8, 2023
Description
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | freetype | Not affected (2.12.1-r0) |
Stream | freetype | Not affected (2.13.2-r0) |
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
- https://lists.debian.org/debian-lts-announce/2019/08/msg00019.html
- https://savannah.nongnu.org/bugs/?45923
- https://support.f5.com/csp/article/K38315305
- https://support.f5.com/csp/article/K38315305?utm_source=f5support&%3Butm_medium=RSS