Search for packages
Package details: pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
Next non-vulnerable version 2.12.1+dfsg-5+deb12u4
Latest non-vulnerable version 2.12.1+dfsg-5+deb12u4
Risk 10.0
Vulnerabilities affecting this package (38)
Vulnerability Summary Fixed by
VCID-13a9-rqnw-ukf1
Aliases:
CVE-2020-15999
GHSA-pv36-h7jh-qm62
In Freetype, if PNG images were embedded into fonts, the Load_SBit_Png function contained an integer overflow that led to a heap buffer overflow, memory corruption, and an exploitable crash.*Note: While Project Zero did discover instances of this vulnerability being exploited in the wild against Chrome, in Firefox this vulnerability is only triggerable if a rarely-used, hidden preference is toggled, and only affected Linux and Android operating systems. Other operating systems are unaffected; and Linux and Android are unaffected in the default configuration.*
2.9.1-3+deb10u3
Affected by 5 other vulnerabilities.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-1exf-drx5-h3du
Aliases:
CVE-2014-9672
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-2s6d-v64u-b7ht
Aliases:
CVE-2015-9381
FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-2wm3-1yvf-93gh
Aliases:
CVE-2014-9669
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-41wk-t7qa-8ka8
Aliases:
CVE-2014-9667
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-5jwk-a9p5-wucg
Aliases:
CVE-2015-9382
FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-5pbn-p8wu-n3bt
Aliases:
CVE-2022-27404
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-61ee-ck9d-nug1
Aliases:
CVE-2022-27406
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-71yp-cjqr-cuds
Aliases:
CVE-2014-9656
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-8kpp-cfj8-cbh5
Aliases:
CVE-2014-9662
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9adn-sytv-2qau
Aliases:
CVE-2014-9675
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9nwu-3fdu-m7c1
Aliases:
CVE-2014-9666
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9x7p-53cz-3yby
Aliases:
CVE-2014-9660
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9zpg-a389-8fc3
Aliases:
CVE-2014-2240
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-abqn-f785-3ydv
Aliases:
CVE-2022-27405
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-adys-usze-bqaf
Aliases:
CVE-2014-9746
security update
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-auqa-26un-zkat
Aliases:
CVE-2017-8287
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-d1en-7h6j-m3cj
Aliases:
CVE-2014-9664
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-dkhv-nw4r-wqc5
Aliases:
CVE-2014-9673
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-drjw-h1s9-8bcn
Aliases:
CVE-2014-2241
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-fgp4-g3js-z3ej
Aliases:
CVE-2017-8105
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-fvm5-667f-ebaf
Aliases:
CVE-2014-9674
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-gvtz-hzgv-xubg
Aliases:
CVE-2014-9661
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-k3fd-zdmc-sqcr
Aliases:
CVE-2015-9290
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-kt2w-xvg1-nkbv
Aliases:
CVE-2016-10244
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-m7w5-ykrk-sfar
Aliases:
CVE-2014-9663
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-mvxt-7z1m-fbe4
Aliases:
CVE-2014-9659
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-njhj-r878-mybu
Aliases:
CVE-2014-9670
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-pvgc-k1fr-mkg8
Aliases:
CVE-2014-9657
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-qxjd-jpvb-ubeg
Aliases:
CVE-2014-9747
security update
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-rjxf-hseb-nqgq
Aliases:
CVE-2014-9668
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-svnx-6c3x-sfe3
Aliases:
CVE-2014-9671
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-t98s-1yz1-8ka9
Aliases:
CVE-2014-9745
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-w4yd-5rsk-h3f8
Aliases:
CVE-2014-9658
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-wcrw-9se1-8ufr
Aliases:
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-xxdy-qcnu-23cn
Aliases:
CVE-2018-6942
An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
2.9.1-3+deb10u3
Affected by 5 other vulnerabilities.
VCID-yjkt-2a6r-wybe
Aliases:
CVE-2014-9665
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-yt26-14rb-hfet
Aliases:
CVE-2025-27363
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
2.12.1+dfsg-5+deb12u4
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (44)
Vulnerability Summary Aliases
VCID-1bv8-ra2a-e3hz Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1143
VCID-1exf-drx5-h3du CVE-2014-9672
VCID-1qxz-7hhb-vyhw CVE-2012-5668
VCID-2uwb-11uf-jbfs Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1129
VCID-2wm3-1yvf-93gh CVE-2014-9669
VCID-41wk-t7qa-8ka8 CVE-2014-9667
VCID-4kq7-ncja-w3c1 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1144
VCID-6wdq-yru9-1qg2 CVE-2011-0226
VCID-71yp-cjqr-cuds CVE-2014-9656
VCID-79sq-ck6s-1qc8 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1133
VCID-7t12-cstg-7fgg Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1139
VCID-82b5-1fp8-bqb7 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1131
VCID-89cr-ps6t-hycu CVE-2012-5669
VCID-9adn-sytv-2qau CVE-2014-9675
VCID-9nwu-3fdu-m7c1 CVE-2014-9666
VCID-9x7p-53cz-3yby CVE-2014-9660
VCID-a595-94ux-mkd6 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1137
VCID-adys-usze-bqaf security update CVE-2014-9746
VCID-b9xa-app7-dffn CVE-2011-3439
VCID-bddp-z7q7-rbh8 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1127
VCID-btb4-cmy2-6ffe Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1132
VCID-czyw-19hc-7yd8 CVE-2012-5670
VCID-d1en-7h6j-m3cj CVE-2014-9664
VCID-dkhv-nw4r-wqc5 CVE-2014-9673
VCID-dumu-29j2-43hf Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1140
VCID-fvm5-667f-ebaf CVE-2014-9674
VCID-gvtz-hzgv-xubg CVE-2014-9661
VCID-hqgu-a9m2-rkdn Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1142
VCID-m5rn-fntz-tfhw Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1141
VCID-m7w5-ykrk-sfar CVE-2014-9663
VCID-njhj-r878-mybu CVE-2014-9670
VCID-pab4-8jv9-6yb3 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1130
VCID-pvgc-k1fr-mkg8 CVE-2014-9657
VCID-q64b-ezp8-jqb5 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1135
VCID-qrst-n13c-b7ez Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1134
VCID-qxjd-jpvb-ubeg security update CVE-2014-9747
VCID-svnx-6c3x-sfe3 CVE-2014-9671
VCID-t98s-1yz1-8ka9 CVE-2014-9745
VCID-uj1s-58a2-uuf8 CVE-2011-3256
VCID-uweh-5m2b-1fgz Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1128
VCID-v59n-1364-k3eu Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1126
VCID-w4yd-5rsk-h3f8 CVE-2014-9658
VCID-xp11-9392-cuf1 Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1138
VCID-zbxb-j4tw-aucd Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates. CVE-2012-1136

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:16:08.295645+00:00 Debian Oval Importer Affected by VCID-wcrw-9se1-8ufr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:02:37.557559+00:00 Debian Oval Importer Affected by VCID-fvm5-667f-ebaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:55:16.211163+00:00 Debian Oval Importer Fixing VCID-m5rn-fntz-tfhw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:52:49.635572+00:00 Debian Oval Importer Affected by VCID-njhj-r878-mybu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:51:32.350460+00:00 Debian Oval Importer Affected by VCID-m7w5-ykrk-sfar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:49:39.371370+00:00 Debian Oval Importer Affected by VCID-yt26-14rb-hfet https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:48:12.665763+00:00 Debian Oval Importer Fixing VCID-v59n-1364-k3eu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:01:14.433162+00:00 Debian Oval Importer Fixing VCID-7t12-cstg-7fgg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:45:59.564981+00:00 Debian Oval Importer Fixing VCID-1qxz-7hhb-vyhw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:31:30.987005+00:00 Debian Oval Importer Fixing VCID-btb4-cmy2-6ffe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:16:28.115762+00:00 Debian Oval Importer Fixing VCID-82b5-1fp8-bqb7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:01:47.202734+00:00 Debian Oval Importer Affected by VCID-kt2w-xvg1-nkbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:49:00.470631+00:00 Debian Oval Importer Fixing VCID-bddp-z7q7-rbh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:36:29.737182+00:00 Debian Oval Importer Affected by VCID-d1en-7h6j-m3cj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:24:21.995738+00:00 Debian Oval Importer Affected by VCID-auqa-26un-zkat https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:23:41.369521+00:00 Debian Oval Importer Fixing VCID-q64b-ezp8-jqb5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:20:12.452187+00:00 Debian Oval Importer Fixing VCID-4kq7-ncja-w3c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:17:25.133181+00:00 Debian Oval Importer Affected by VCID-mvxt-7z1m-fbe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:16:02.503608+00:00 Debian Oval Importer Affected by VCID-9adn-sytv-2qau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:13:22.887623+00:00 Debian Oval Importer Affected by VCID-2s6d-v64u-b7ht https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:03:02.459054+00:00 Debian Oval Importer Affected by VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:41:55.098053+00:00 Debian Oval Importer Affected by VCID-1exf-drx5-h3du https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:37.125805+00:00 Debian Oval Importer Fixing VCID-2uwb-11uf-jbfs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:23:57.474091+00:00 Debian Oval Importer Fixing VCID-1bv8-ra2a-e3hz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:12:22.150251+00:00 Debian Oval Importer Affected by VCID-xxdy-qcnu-23cn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:57:38.240074+00:00 Debian Oval Importer Affected by VCID-fgp4-g3js-z3ej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:56:04.264570+00:00 Debian Oval Importer Affected by VCID-61ee-ck9d-nug1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:56:00.465605+00:00 Debian Oval Importer Affected by VCID-8kpp-cfj8-cbh5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:49:22.507707+00:00 Debian Oval Importer Affected by VCID-drjw-h1s9-8bcn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:47:51.876964+00:00 Debian Oval Importer Fixing VCID-qrst-n13c-b7ez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:45:48.437052+00:00 Debian Oval Importer Fixing VCID-b9xa-app7-dffn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:45:15.705154+00:00 Debian Oval Importer Affected by VCID-pvgc-k1fr-mkg8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:42:14.693321+00:00 Debian Oval Importer Fixing VCID-hqgu-a9m2-rkdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:41:22.856576+00:00 Debian Oval Importer Affected by VCID-gvtz-hzgv-xubg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:36:15.386607+00:00 Debian Oval Importer Fixing VCID-dumu-29j2-43hf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:28:32.724034+00:00 Debian Oval Importer Affected by VCID-71yp-cjqr-cuds https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:23:27.820842+00:00 Debian Oval Importer Affected by VCID-13a9-rqnw-ukf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:21:41.825809+00:00 Debian Oval Importer Affected by VCID-9nwu-3fdu-m7c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:58:47.404090+00:00 Debian Oval Importer Affected by VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:50:55.569060+00:00 Debian Oval Importer Fixing VCID-79sq-ck6s-1qc8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:36:20.921566+00:00 Debian Oval Importer Affected by VCID-9zpg-a389-8fc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:28:16.856799+00:00 Debian Oval Importer Affected by VCID-dkhv-nw4r-wqc5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:28:08.050454+00:00 Debian Oval Importer Fixing VCID-pab4-8jv9-6yb3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:43.445528+00:00 Debian Oval Importer Affected by VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:02:31.179186+00:00 Debian Oval Importer Affected by VCID-rjxf-hseb-nqgq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:00:12.137794+00:00 Debian Oval Importer Fixing VCID-89cr-ps6t-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:57:16.854415+00:00 Debian Oval Importer Affected by VCID-5pbn-p8wu-n3bt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:51:22.213105+00:00 Debian Oval Importer Affected by VCID-5jwk-a9p5-wucg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:44:37.213393+00:00 Debian Oval Importer Fixing VCID-czyw-19hc-7yd8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:41:51.016321+00:00 Debian Oval Importer Affected by VCID-svnx-6c3x-sfe3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:34:34.993178+00:00 Debian Oval Importer Fixing VCID-a595-94ux-mkd6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:27:23.465592+00:00 Debian Oval Importer Fixing VCID-uweh-5m2b-1fgz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:25:26.701190+00:00 Debian Oval Importer Affected by VCID-k3fd-zdmc-sqcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:14:03.953092+00:00 Debian Oval Importer Affected by VCID-2wm3-1yvf-93gh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:01:49.028327+00:00 Debian Oval Importer Fixing VCID-6wdq-yru9-1qg2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:56:34.345525+00:00 Debian Oval Importer Fixing VCID-zbxb-j4tw-aucd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:46:13.199857+00:00 Debian Oval Importer Affected by VCID-41wk-t7qa-8ka8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:33:27.965449+00:00 Debian Oval Importer Affected by VCID-abqn-f785-3ydv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:21:12.326233+00:00 Debian Oval Importer Fixing VCID-uj1s-58a2-uuf8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:00:30.234471+00:00 Debian Oval Importer Affected by VCID-yjkt-2a6r-wybe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:55:43.650809+00:00 Debian Oval Importer Fixing VCID-xp11-9392-cuf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:54:15.062719+00:00 Debian Oval Importer Affected by VCID-w4yd-5rsk-h3f8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:54:09.899282+00:00 Debian Oval Importer Affected by VCID-9x7p-53cz-3yby https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:43:08.469734+00:00 Debian Oval Importer Affected by VCID-13a9-rqnw-ukf1 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T10:32:04.801008+00:00 Debian Oval Importer Affected by VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:15:38.214000+00:00 Debian Oval Importer Affected by VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:05:27.715042+00:00 Debian Oval Importer Affected by VCID-fgp4-g3js-z3ej https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:01:01.438835+00:00 Debian Oval Importer Affected by VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:56:24.165823+00:00 Debian Oval Importer Affected by VCID-auqa-26un-zkat https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:55:11.417024+00:00 Debian Oval Importer Affected by VCID-kt2w-xvg1-nkbv https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:49:02.425525+00:00 Debian Oval Importer Fixing VCID-9x7p-53cz-3yby https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:48:58.170312+00:00 Debian Oval Importer Fixing VCID-fvm5-667f-ebaf https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:46:47.509584+00:00 Debian Oval Importer Fixing VCID-m7w5-ykrk-sfar https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:45:43.156703+00:00 Debian Oval Importer Fixing VCID-gvtz-hzgv-xubg https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:44:57.077089+00:00 Debian Oval Importer Fixing VCID-njhj-r878-mybu https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:43:26.677826+00:00 Debian Oval Importer Fixing VCID-2wm3-1yvf-93gh https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:43:21.479250+00:00 Debian Oval Importer Fixing VCID-71yp-cjqr-cuds https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:55.082586+00:00 Debian Oval Importer Fixing VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:50.824262+00:00 Debian Oval Importer Fixing VCID-d1en-7h6j-m3cj https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:15.917636+00:00 Debian Oval Importer Fixing VCID-9nwu-3fdu-m7c1 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:39:51.893403+00:00 Debian Oval Importer Fixing VCID-1exf-drx5-h3du https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:39:42.682344+00:00 Debian Oval Importer Fixing VCID-9adn-sytv-2qau https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:35:19.751808+00:00 Debian Oval Importer Fixing VCID-dkhv-nw4r-wqc5 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:35:07.440179+00:00 Debian Oval Importer Fixing VCID-41wk-t7qa-8ka8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:34:16.946287+00:00 Debian Oval Importer Fixing VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:32:01.869610+00:00 Debian Oval Importer Fixing VCID-w4yd-5rsk-h3f8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:27:22.331489+00:00 Debian Oval Importer Fixing VCID-svnx-6c3x-sfe3 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:20:35.769583+00:00 Debian Oval Importer Fixing VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:20:18.052322+00:00 Debian Oval Importer Fixing VCID-pvgc-k1fr-mkg8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0