First published: Tue Sep 03 2019(Updated: )
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <2.6.2 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
debian/freetype | 2.10.4+dfsg-1+deb11u1 2.12.1+dfsg-5+deb12u3 2.13.3+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-9383 is a vulnerability in FreeType before 2.6.2 that allows for a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
CVE-2015-9383 has a severity rating of 6.5 (Medium).
FreeType versions before 2.6.2 are affected, including certain versions of Debian and Ubuntu Linux.
To fix the CVE-2015-9383 vulnerability in FreeType, update to version 2.9.1-3+deb10u3 (or higher) on Debian, or version 2.5.2-1ubuntu2.8+ (or higher) on Ubuntu.
You can find more information about CVE-2015-9383 in the references provided: [link1](http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd), [link2](https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html), [link3](https://savannah.nongnu.org/bugs/?46346).