CVE-2015-9382

FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:40

Type Values Removed Values Added
References () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73 - Patch, Third Party Advisory () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73 - Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:4254 - () https://access.redhat.com/errata/RHSA-2019:4254 -
References () https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html - Third Party Advisory
References () https://savannah.nongnu.org/bugs/?45922 - Exploit, Issue Tracking, Third Party Advisory () https://savannah.nongnu.org/bugs/?45922 - Exploit, Issue Tracking, Third Party Advisory
References () https://usn.ubuntu.com/4126-2/ - () https://usn.ubuntu.com/4126-2/ -

Information

Published : 2019-09-03 05:15

Updated : 2024-11-21 02:40


NVD link : CVE-2015-9382

Mitre link : CVE-2015-9382

CVE.ORG link : CVE-2015-9382


JSON object : View

Products Affected

debian

  • debian_linux

freetype

  • freetype
CWE
CWE-125

Out-of-bounds Read