Lucene search

K

[SECURITY] [DSA 2328-1] freetype security update

🗓️ 24 Oct 2011 20:32:22Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 20 Views

Debian free type package missing input sanitizing leads to memory corruption, denial of service, and code execution

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian6kfreebsd-amd64libfreetype6-dev2.4.2-2.1+squeeze2libfreetype6-dev_2.4.2-2.1+squeeze2_kfreebsd-amd64.deb
Debian5sparclibfreetype62.3.7-2+lenny7libfreetype6_2.3.7-2+lenny7_sparc.deb
Debian5alphalibfreetype62.3.7-2+lenny7libfreetype6_2.3.7-2+lenny7_alpha.deb
Debian5i386libfreetype62.3.7-2+lenny7libfreetype6_2.3.7-2+lenny7_i386.deb
Debian6ia64libfreetype62.4.2-2.1+squeeze2libfreetype6_2.4.2-2.1+squeeze2_ia64.deb
Debian6powerpclibfreetype6-dev2.4.2-2.1+squeeze2libfreetype6-dev_2.4.2-2.1+squeeze2_powerpc.deb
Debian5armellibfreetype6-dev2.3.7-2+lenny7libfreetype6-dev_2.3.7-2+lenny7_armel.deb
Debian5armellibfreetype62.3.7-2+lenny7libfreetype6_2.3.7-2+lenny7_armel.deb
Debian6armellibfreetype62.4.2-2.1+squeeze2libfreetype6_2.4.2-2.1+squeeze2_armel.deb
Debian5hppalibfreetype62.3.7-2+lenny7libfreetype6_2.3.7-2+lenny7_hppa.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Oct 2011 20:22Current
6.1Medium risk
Vulners AI Score6.1
CVSS24.3
EPSS0.023
20
.json
Report