Debian Security Advisory
DLA-1909-1 freetype -- LTS security update
- Date Reported:
- 04 Sep 2019
- Affected Packages:
- freetype
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2015-9381, CVE-2015-9382, CVE-2015-9383.
- More information:
-
Several newly-referenced issues have been fixed in the FreeType 2 font engine.
- CVE-2015-9381
heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c
- CVE-2015-9382
buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation
- CVE-2015-9383
a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c
For Debian 8
Jessie
, these problems have been fixed in version 2.5.2-3+deb8u4.We recommend that you upgrade your freetype packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2015-9381