A vulnerability was found in FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. Reference: https://savannah.nongnu.org/bugs/?45923 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
Created freetype tracking bugs for this issue: Affects: fedora-all [bug 1741803]
Hi, is this an issue in current Fedora? I see that we have 2.9.1 in Fedora 29 and the code fixing this issue is there. Also I can not reproduce this with the reproducer on Fedora 30.
In reply to comment #2: > Hi, is this an issue in current Fedora? I see that we have 2.9.1 in Fedora > 29 and the code fixing this issue is there. Also I can not reproduce this > with the reproducer on Fedora 30. It seems not: while this CVE assignment was only published recently, the original issue was fixed upstream in release 2.6.1, and is present in active Fedora releases. The Fedora tracking bug 1741803 can be closed.
Statement: This issue affects the versions of freetype as shipped with Red Hat Enterprise Linux 5 and 6. This issue did not affect the versions of freetype as shipped with Red Hat Enterprise Linux 7 and 8. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2015-9290