Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/mono@4.2.1.102%2Bdfsg2-4?distro=trixie
purl pkg:deb/debian/mono@4.2.1.102%2Bdfsg2-4?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-2jhf-j64s-gygy Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer.Update: The underlying flaw in the dtoa routines used by Mozilla appears to be essentially the same as that reported against the libc gdtoa routine by Maksymilian Arciemowicz. CVE-2009-0689

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:19:05.687151+00:00 Debian Importer Fixing VCID-2jhf-j64s-gygy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-11T18:13:30.287265+00:00 Debian Importer Fixing VCID-2jhf-j64s-gygy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:46:05.565429+00:00 Debian Importer Fixing VCID-2jhf-j64s-gygy https://security-tracker.debian.org/tracker/data/json 38.1.0