{"id":"CVE-2020-15999","details":"Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","aliases":["A-171232105","ASB-A-171232105","GHSA-pv36-h7jh-qm62"],"modified":"2026-04-10T04:23:14.541152Z","published":"2020-11-03T03:15:14.853Z","related":["ALSA-2020:4952","MGASA-2020-0389","SUSE-SU-2020:14548-1","SUSE-SU-2020:2995-1","SUSE-SU-2020:2998-1","SUSE-SU-2020:3383-1","SUSE-SU-2020:3458-1","SUSE-SU-2020:3528-1","SUSE-SU-2020:3548-1","openSUSE-SU-2020:1718-1","openSUSE-SU-2020:1731-1","openSUSE-SU-2020:1734-1","openSUSE-SU-2020:1737-1","openSUSE-SU-2020:1744-1","openSUSE-SU-2020:1829-1","openSUSE-SU-2020:1952-1","openSUSE-SU-2020:2020-1","openSUSE-SU-2020:2031-1","openSUSE-SU-2020:2096-1","openSUSE-SU-2020:2187-1","openSUSE-SU-2020:2315-1","openSUSE-SU-2021:1134-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:10681-1","openSUSE-SU-2024:10770-1","openSUSE-SU-2024:11209-1","openSUSE-SU-2024:12948-1","openSUSE-SU-2024:13827-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-15999"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Nov/33"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202012-04"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-19"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202011-12"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4824"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240812-0001/"},{"type":"REPORT","url":"https://crbug.com/1139963"},{"type":"EVIDENCE","url":"https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/freetype/freetype","events":[{"introduced":"0"},{"fixed":"6a2b3e4007e794bfc6c91030d0ed987f925164a8"}],"database_specific":{"versions":[{"introduced":"2.6.0"},{"fixed":"2.10.4"}]}}],"versions":["BETA-5","BETA-6","BETA-7","BETA-8","DATE-050920","PRE-2-0-1","PRE-2-0-6","RELEASE-2-0","VER-2-0","VER-2-0-1","VER-2-0-2","VER-2-0-2-TEST","VER-2-0-3","VER-2-0-4","VER-2-0-5","VER-2-0-6","VER-2-0-7","VER-2-0-8","VER-2-1-0","VER-2-1-1","VER-2-1-1-RC1","VER-2-1-10","VER-2-1-2","VER-2-1-2-RC1","VER-2-1-3","VER-2-1-3-RC1","VER-2-1-3-RC2","VER-2-1-3-RC3","VER-2-1-4","VER-2-1-4-RC1","VER-2-1-4-RC2","VER-2-1-5-RC1","VER-2-1-6","VER-2-1-7","VER-2-1-8","VER-2-1-8-RC1","VER-2-1-9","VER-2-10-0","VER-2-10-1","VER-2-10-2","VER-2-10-3","VER-2-2-0","VER-2-2-0-RC1","VER-2-2-0-RC2","VER-2-2-0-RC3","VER-2-2-0-RC4","VER-2-2-1","VER-2-3-0","VER-2-3-0-FINAL","VER-2-3-0-RC1","VER-2-3-0-RC2","VER-2-3-1","VER-2-3-1-FINAL","VER-2-3-10","VER-2-3-11","VER-2-3-12","VER-2-3-2","VER-2-3-3","VER-2-3-4","VER-2-3-5","VER-2-3-5-REAL","VER-2-3-6","VER-2-3-7","VER-2-3-8","VER-2-3-9","VER-2-4-0","VER-2-4-1","VER-2-4-10","VER-2-4-11","VER-2-4-12","VER-2-4-12-beta","VER-2-4-2","VER-2-4-3","VER-2-4-4","VER-2-4-5","VER-2-4-6","VER-2-4-7","VER-2-4-8","VER-2-4-9","VER-2-5-0","VER-2-5-0-1","VER-2-5-1","VER-2-5-2","VER-2-5-3","VER-2-5-4","VER-2-5-5","VER-2-6","VER-2-6-1","VER-2-6-2","VER-2-6-3","VER-2-6-4","VER-2-7","VER-2-7-1","VER-2-8","VER-2-8-1","VER-2-9","VER-2-9-1","VER-2-BETA2","VER-2-BETA3","VER-2-BETA4","freetype","freetype2","import","start"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"86.0.4240.111"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15999.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}