https://bugzilla.redhat.com/show_bug.cgi?id=1741802
Bug ID: 1741802
Summary: CVE-2015-9290 freetype: buffer over-read in function
T1_Get_Private_Dict in type1/t1parse.c
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: darunesh(a)redhat.com
CC: ajax(a)redhat.com, caillon+fedoraproject(a)gmail.com,
dblechte(a)redhat.com, dfediuck(a)redhat.com,
eedri(a)redhat.com, fonts-bugs(a)lists.fedoraproject.org,
gnome-sig(a)lists.fedoraproject.org,
john.j5live(a)gmail.com, kevin(a)tigcc.ticalc.org,
mclasen(a)redhat.com, mgoldboi(a)redhat.com,
michal.skrivanek(a)redhat.com, mkasik(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com, sbonazzo(a)redhat.com,
sherold(a)redhat.com, yturgema(a)redhat.com
Target Milestone: ---
Classification: Other
A vulnerability was found in FreeType before 2.6.1, a buffer over-read occurs
in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that
the new values of cur and limit are sensible before going to Again.
Reference:
https://savannah.nongnu.org/bugs/?45923
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/...
--
You are receiving this mail because:
You are on the CC list for the bug.