Bug 1149384 (CVE-2015-9381) - VUL-1: CVE-2015-9381: freetype2: heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c
Summary: VUL-1: CVE-2015-9381: freetype2: heap-based buffer over-read in T1_Get_Privat...
Status: RESOLVED FIXED
Alias: CVE-2015-9381
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/241647/
Whiteboard: CVSSv3:SUSE:CVE-2015-9381:4.4:(AV:L/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2019-09-04 11:55 UTC by Alexandros Toptsoglou
Modified: 2024-05-06 12:46 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Alexandros Toptsoglou 2019-09-04 12:23:14 UTC
The fix is available at [1] (version 2.6.1). The fix seems applicable to the currently supported and older versions of freetype2. Based on this the following codestreams are tracked as affected: 

SUSE:SLE-10-SP3:Update 
SUSE:SLE-11:Update 
SUSE:SLE-12:Update 

Instructions for reproducing the issue can be found at [2]. 

My attempt to reproduce the issue in SLE11 was not successful.

[1] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9

[2] https://savannah.nongnu.org/bugs/?45955
Comment 4 Thomas Leroy 2024-05-06 12:46:18 UTC
All done, closing.