CVE-2015-9382Out-of-bounds Read in Freetype

Severity
6.5MEDIUMNVD
OSV8.8
EPSS
0.8%
top 25.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 3
Latest updateMay 24

Description

FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/freetype< freetype 2.6.1-0.1 (bookworm)
NVDfreetype/freetype< 2.6.1
Debianfreetype/freetype< 2.6.1-0.1+3
Ubuntufreetype/freetype< 2.5.2-1ubuntu2.8+esm1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mvvp-jc53-vjxq: FreeType before 22022-05-24
OSV
freetype vulnerabilities2019-09-09
OSV
CVE-2015-9382: FreeType before 22019-09-03

📋Vendor Advisories

3
Ubuntu
FreeType vulnerabilities2019-09-09
Red Hat
freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read2019-09-03
Debian
CVE-2015-9382: freetype - FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c b...2015

💬Community

2
Bugzilla
CVE-2015-9382 freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read2019-10-21
Bugzilla
CVE-2015-9382 freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read [fedora-all]2019-10-21
CVE-2015-9382 — Out-of-bounds Read in Freetype | cvebase