Bug 1143564 (CVE-2015-9290) - VUL-1: CVE-2015-9290: freetype2: before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
Summary: VUL-1: CVE-2015-9290: freetype2: before 2.6.1, a buffer over-read occurs in t...
Status: RESOLVED WORKSFORME
Alias: CVE-2015-9290
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Fridrich Strba
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/238281/
Whiteboard: CVSSv3:SUSE:CVE-2015-9290:3.3:(AV:L/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2019-07-31 08:13 UTC by Wolfgang Frisch
Modified: 2022-04-07 09:13 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2019-07-31 08:13:10 UTC
CVE-2015-9290

In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on
function T1_Get_Private_Dict where there is no check that the new values of cur
and limit are sensible before going to Again.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
https://savannah.nongnu.org/bugs/?45923
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
Comment 1 Wolfgang Frisch 2019-07-31 08:14:44 UTC
SUSE:SLE-11:Update is affected. The patch supplied by upstream applies cleanly.
SUSE:SLE-12-SP2:Update is already fixed.
SUSE:SLE-15:Update  is already fixed.
Comment 2 Petr Ostadal 2022-04-07 09:13:24 UTC
close