Vulnerability Description
FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freetype | Freetype | < 2.6.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.PatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4254
- https://lists.debian.org/debian-lts-announce/2019/09/msg00002.htmlThird Party Advisory
- https://savannah.nongnu.org/bugs/?45922ExploitIssue TrackingThird Party Advisory
- https://usn.ubuntu.com/4126-2/
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.PatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4254
- https://lists.debian.org/debian-lts-announce/2019/09/msg00002.htmlThird Party Advisory
- https://savannah.nongnu.org/bugs/?45922ExploitIssue TrackingThird Party Advisory
- https://usn.ubuntu.com/4126-2/
FAQ
What is CVE-2015-9382?
CVE-2015-9382 is a vulnerability with a CVSS score of 6.5 (MEDIUM). FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
How severe is CVE-2015-9382?
CVE-2015-9382 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-9382?
Check the references section above for vendor advisories and patch information. Affected products include: Freetype Freetype, Debian Debian Linux.