Search for packages
Package details: pkg:deb/debian/freetype@2.2.1-5%2Betch4
purl pkg:deb/debian/freetype@2.2.1-5%2Betch4
Next non-vulnerable version 2.12.1+dfsg-5+deb12u4
Latest non-vulnerable version 2.12.1+dfsg-5+deb12u4
Risk 10.0
Vulnerabilities affecting this package (88)
Vulnerability Summary Fixed by
VCID-13a9-rqnw-ukf1
Aliases:
CVE-2020-15999
GHSA-pv36-h7jh-qm62
In Freetype, if PNG images were embedded into fonts, the Load_SBit_Png function contained an integer overflow that led to a heap buffer overflow, memory corruption, and an exploitable crash.*Note: While Project Zero did discover instances of this vulnerability being exploited in the wild against Chrome, in Firefox this vulnerability is only triggerable if a rarely-used, hidden preference is toggled, and only affected Linux and Android operating systems. Other operating systems are unaffected; and Linux and Android are unaffected in the default configuration.*
2.9.1-3+deb10u3
Affected by 5 other vulnerabilities.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-1bv8-ra2a-e3hz
Aliases:
CVE-2012-1143
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-1exf-drx5-h3du
Aliases:
CVE-2014-9672
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-1qxz-7hhb-vyhw
Aliases:
CVE-2012-5668
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-2s6d-v64u-b7ht
Aliases:
CVE-2015-9381
FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-2uwb-11uf-jbfs
Aliases:
CVE-2012-1129
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-2wm3-1yvf-93gh
Aliases:
CVE-2014-9669
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-41wk-t7qa-8ka8
Aliases:
CVE-2014-9667
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-4kq7-ncja-w3c1
Aliases:
CVE-2012-1144
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-5jwk-a9p5-wucg
Aliases:
CVE-2015-9382
FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-5pbn-p8wu-n3bt
Aliases:
CVE-2022-27404
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-61ee-ck9d-nug1
Aliases:
CVE-2022-27406
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-6fyw-dnj2-cfeh
Aliases:
CVE-2010-2808
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-6kqn-b3jz-7yce
Aliases:
CVE-2010-3311
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-6wdq-yru9-1qg2
Aliases:
CVE-2011-0226
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-71yp-cjqr-cuds
Aliases:
CVE-2014-9656
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-79sq-ck6s-1qc8
Aliases:
CVE-2012-1133
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-7juk-sxf8-d3d5
Aliases:
CVE-2010-2500
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-7t12-cstg-7fgg
Aliases:
CVE-2012-1139
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-7zvg-h1e7-qff3
Aliases:
CVE-2010-2497
freetype: integer underflow vulnerability
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-82b5-1fp8-bqb7
Aliases:
CVE-2012-1131
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-89cr-ps6t-hycu
Aliases:
CVE-2012-5669
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-8kpp-cfj8-cbh5
Aliases:
CVE-2014-9662
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-92md-pkwm-yyb4
Aliases:
CVE-2008-1807
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-9adn-sytv-2qau
Aliases:
CVE-2014-9675
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9nwu-3fdu-m7c1
Aliases:
CVE-2014-9666
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9x7p-53cz-3yby
Aliases:
CVE-2014-9660
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-9zpg-a389-8fc3
Aliases:
CVE-2014-2240
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-a595-94ux-mkd6
Aliases:
CVE-2012-1137
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-abqn-f785-3ydv
Aliases:
CVE-2022-27405
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
2.10.4+dfsg-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-ad18-t4ua-gbdh
Aliases:
CVE-2010-1797
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-adys-usze-bqaf
Aliases:
CVE-2014-9746
security update
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-auqa-26un-zkat
Aliases:
CVE-2017-8287
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-b9xa-app7-dffn
Aliases:
CVE-2011-3439
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-bddp-z7q7-rbh8
Aliases:
CVE-2012-1127
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-btb4-cmy2-6ffe
Aliases:
CVE-2012-1132
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-cqks-9fvy-tyf7
Aliases:
CVE-2010-2807
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-czyw-19hc-7yd8
Aliases:
CVE-2012-5670
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-d1en-7h6j-m3cj
Aliases:
CVE-2014-9664
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-d6jc-ams3-yqg2
Aliases:
CVE-2007-3506
CVE-2007-3506 Emboldden rendering with a sbit font makes glibc detected.
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-djn1-vene-xkg5
Aliases:
CVE-2007-1351
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-dkhv-nw4r-wqc5
Aliases:
CVE-2014-9673
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-dnbx-qrv8-p7fj
Aliases:
CVE-2010-3053
freetype: NULL pointer deref in bdf/bdflib.c
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-drjw-h1s9-8bcn
Aliases:
CVE-2014-2241
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-dumu-29j2-43hf
Aliases:
CVE-2012-1140
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-f7q4-f6yg-p3cx
Aliases:
CVE-2010-2805
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-fgp4-g3js-z3ej
Aliases:
CVE-2017-8105
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-fngc-tfhn-8fbp
Aliases:
CVE-2007-2754
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-fvm5-667f-ebaf
Aliases:
CVE-2014-9674
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-g9kx-xdac-w3as
Aliases:
CVE-2010-2519
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-ggtx-ejjc-27gu
Aliases:
CVE-2010-3855
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-gvtz-hzgv-xubg
Aliases:
CVE-2014-9661
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-gz2g-4nha-c3ey
Aliases:
CVE-2009-0946
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-hqgu-a9m2-rkdn
Aliases:
CVE-2012-1142
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-jc84-ppvg-jqe1
Aliases:
CVE-2008-1808
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-jmyx-xhwn-rkhn
Aliases:
CVE-2010-2499
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-k3fd-zdmc-sqcr
Aliases:
CVE-2015-9290
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-ka8y-gjxr-mug1
Aliases:
CVE-2010-2498
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-krxb-vgnu-gffu
Aliases:
CVE-2008-1806
2.3.7-2+lenny8
Affected by 82 other vulnerabilities.
VCID-kt2w-xvg1-nkbv
Aliases:
CVE-2016-10244
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-m5rn-fntz-tfhw
Aliases:
CVE-2012-1141
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-m7w5-ykrk-sfar
Aliases:
CVE-2014-9663
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-mvxt-7z1m-fbe4
Aliases:
CVE-2014-9659
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-njhj-r878-mybu
Aliases:
CVE-2014-9670
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-pab4-8jv9-6yb3
Aliases:
CVE-2012-1130
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-pvgc-k1fr-mkg8
Aliases:
CVE-2014-9657
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-q64b-ezp8-jqb5
Aliases:
CVE-2012-1135
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-qrst-n13c-b7ez
Aliases:
CVE-2012-1134
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-qxjd-jpvb-ubeg
Aliases:
CVE-2014-9747
security update
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-r23j-thhz-1fgg
Aliases:
CVE-2010-2541
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-r53k-qnkp-wbbf
Aliases:
CVE-2010-2520
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-r6d4-xhky-yuhd
Aliases:
CVE-2010-2806
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-rjxf-hseb-nqgq
Aliases:
CVE-2014-9668
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-svnx-6c3x-sfe3
Aliases:
CVE-2014-9671
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-t98s-1yz1-8ka9
Aliases:
CVE-2014-9745
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3+deb8u2
Affected by 16 other vulnerabilities.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-uj1s-58a2-uuf8
Aliases:
CVE-2011-3256
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-uweh-5m2b-1fgz
Aliases:
CVE-2012-1128
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-v59n-1364-k3eu
Aliases:
CVE-2012-1126
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-vpw9-fwhj-5ka1
Aliases:
CVE-2010-3054
freetype: DoS via nested "seac" calls
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-w4yd-5rsk-h3f8
Aliases:
CVE-2014-9658
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-wcrw-9se1-8ufr
Aliases:
CVE-2015-9383
FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
2.6.3-3.2+deb9u1
Affected by 6 other vulnerabilities.
VCID-wdzu-k15d-gfha
Aliases:
CVE-2010-2527
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-xjnu-a1z2-17bg
Aliases:
CVE-2010-3814
2.4.2-2.1+squeeze4
Affected by 63 other vulnerabilities.
VCID-xp11-9392-cuf1
Aliases:
CVE-2012-1138
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
VCID-xxdy-qcnu-23cn
Aliases:
CVE-2018-6942
An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
2.9.1-3+deb10u3
Affected by 5 other vulnerabilities.
VCID-yjkt-2a6r-wybe
Aliases:
CVE-2014-9665
2.5.2-3
Affected by 16 other vulnerabilities.
VCID-yt26-14rb-hfet
Aliases:
CVE-2025-27363
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
2.12.1+dfsg-5+deb12u4
Affected by 0 other vulnerabilities.
VCID-zbxb-j4tw-aucd
Aliases:
CVE-2012-1136
Mateusz Jurczyk of the Google Security Team used the Address Sanitizer tool to discover a series of memory safety bugs in the FreeType library, some of which could cause memory corruption and exploitable crashes with certain fonts and font parsing. Firefox Mobile has been upgraded to FreeType version 2.4.9 which addresses these issues. Desktop Firefox does not use Freetype for fonts and was not affected. On Linux systems, Firefox will use the installed system library for FreeType. Linux users should make sure they are current on system security updates.
2.4.9-1.1+deb7u3
Affected by 38 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:16:08.276202+00:00 Debian Oval Importer Affected by VCID-wcrw-9se1-8ufr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:02:37.538910+00:00 Debian Oval Importer Affected by VCID-fvm5-667f-ebaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:55:16.191486+00:00 Debian Oval Importer Affected by VCID-m5rn-fntz-tfhw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:53:51.125027+00:00 Debian Oval Importer Affected by VCID-xjnu-a1z2-17bg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:52:49.617986+00:00 Debian Oval Importer Affected by VCID-njhj-r878-mybu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:51:32.332844+00:00 Debian Oval Importer Affected by VCID-m7w5-ykrk-sfar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:49:39.351221+00:00 Debian Oval Importer Affected by VCID-yt26-14rb-hfet https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:48:12.645547+00:00 Debian Oval Importer Affected by VCID-v59n-1364-k3eu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:14:53.440192+00:00 Debian Oval Importer Affected by VCID-r53k-qnkp-wbbf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:05:59.171260+00:00 Debian Oval Importer Affected by VCID-gz2g-4nha-c3ey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:04:44.432215+00:00 Debian Oval Importer Affected by VCID-d6jc-ams3-yqg2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:01:14.412841+00:00 Debian Oval Importer Affected by VCID-7t12-cstg-7fgg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:45:59.556801+00:00 Debian Oval Importer Affected by VCID-1qxz-7hhb-vyhw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:31:30.967572+00:00 Debian Oval Importer Affected by VCID-btb4-cmy2-6ffe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:16:28.096542+00:00 Debian Oval Importer Affected by VCID-82b5-1fp8-bqb7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:13:10.515139+00:00 Debian Oval Importer Affected by VCID-krxb-vgnu-gffu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:12:50.848385+00:00 Debian Oval Importer Affected by VCID-7juk-sxf8-d3d5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:01:47.185906+00:00 Debian Oval Importer Affected by VCID-kt2w-xvg1-nkbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:00:05.252924+00:00 Debian Oval Importer Affected by VCID-jc84-ppvg-jqe1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:53:23.879672+00:00 Debian Oval Importer Affected by VCID-ggtx-ejjc-27gu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:49:00.452325+00:00 Debian Oval Importer Affected by VCID-bddp-z7q7-rbh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:36:29.719195+00:00 Debian Oval Importer Affected by VCID-d1en-7h6j-m3cj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:24:21.979225+00:00 Debian Oval Importer Affected by VCID-auqa-26un-zkat https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:23:41.350316+00:00 Debian Oval Importer Affected by VCID-q64b-ezp8-jqb5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:20:12.433400+00:00 Debian Oval Importer Affected by VCID-4kq7-ncja-w3c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:17:25.114329+00:00 Debian Oval Importer Affected by VCID-mvxt-7z1m-fbe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:16:02.486686+00:00 Debian Oval Importer Affected by VCID-9adn-sytv-2qau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:13:22.869256+00:00 Debian Oval Importer Affected by VCID-2s6d-v64u-b7ht https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:04:53.983642+00:00 Debian Oval Importer Affected by VCID-wdzu-k15d-gfha https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:03:02.442609+00:00 Debian Oval Importer Affected by VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:41:55.081106+00:00 Debian Oval Importer Affected by VCID-1exf-drx5-h3du https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:41:40.761749+00:00 Debian Oval Importer Affected by VCID-92md-pkwm-yyb4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:36:08.712056+00:00 Debian Oval Importer Affected by VCID-djn1-vene-xkg5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:37.106593+00:00 Debian Oval Importer Affected by VCID-2uwb-11uf-jbfs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:23:57.455526+00:00 Debian Oval Importer Affected by VCID-1bv8-ra2a-e3hz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:12:38.834227+00:00 Debian Oval Importer Affected by VCID-g9kx-xdac-w3as https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:12:22.131324+00:00 Debian Oval Importer Affected by VCID-xxdy-qcnu-23cn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:57:38.222978+00:00 Debian Oval Importer Affected by VCID-fgp4-g3js-z3ej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:56:04.245363+00:00 Debian Oval Importer Affected by VCID-61ee-ck9d-nug1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:56:00.447075+00:00 Debian Oval Importer Affected by VCID-8kpp-cfj8-cbh5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:51:45.012454+00:00 Debian Oval Importer Affected by VCID-f7q4-f6yg-p3cx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:51:17.070281+00:00 Debian Oval Importer Affected by VCID-6fyw-dnj2-cfeh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:49:22.488874+00:00 Debian Oval Importer Affected by VCID-drjw-h1s9-8bcn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:47:51.858258+00:00 Debian Oval Importer Affected by VCID-qrst-n13c-b7ez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:45:48.418082+00:00 Debian Oval Importer Affected by VCID-b9xa-app7-dffn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:45:15.688094+00:00 Debian Oval Importer Affected by VCID-pvgc-k1fr-mkg8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:43:41.348254+00:00 Debian Oval Importer Affected by VCID-fngc-tfhn-8fbp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:42:14.674895+00:00 Debian Oval Importer Affected by VCID-hqgu-a9m2-rkdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:41:22.840229+00:00 Debian Oval Importer Affected by VCID-gvtz-hzgv-xubg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:36:15.367520+00:00 Debian Oval Importer Affected by VCID-dumu-29j2-43hf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:28:32.705720+00:00 Debian Oval Importer Affected by VCID-71yp-cjqr-cuds https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:23:27.803708+00:00 Debian Oval Importer Affected by VCID-13a9-rqnw-ukf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:21:41.808626+00:00 Debian Oval Importer Affected by VCID-9nwu-3fdu-m7c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:10:06.249742+00:00 Debian Oval Importer Affected by VCID-r23j-thhz-1fgg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:06:00.735596+00:00 Debian Oval Importer Affected by VCID-vpw9-fwhj-5ka1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:58:47.387124+00:00 Debian Oval Importer Affected by VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:52:24.993797+00:00 Debian Oval Importer Affected by VCID-ka8y-gjxr-mug1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:50:55.550108+00:00 Debian Oval Importer Affected by VCID-79sq-ck6s-1qc8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:44:29.277966+00:00 Debian Oval Importer Affected by VCID-dnbx-qrv8-p7fj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:36:20.901508+00:00 Debian Oval Importer Affected by VCID-9zpg-a389-8fc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:28:16.840184+00:00 Debian Oval Importer Affected by VCID-dkhv-nw4r-wqc5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:28:08.031328+00:00 Debian Oval Importer Affected by VCID-pab4-8jv9-6yb3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:43.429170+00:00 Debian Oval Importer Affected by VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:03:19.356368+00:00 Debian Oval Importer Affected by VCID-r6d4-xhky-yuhd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:02:31.160251+00:00 Debian Oval Importer Affected by VCID-rjxf-hseb-nqgq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:00:12.119486+00:00 Debian Oval Importer Affected by VCID-89cr-ps6t-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:57:16.834361+00:00 Debian Oval Importer Affected by VCID-5pbn-p8wu-n3bt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:51:22.193541+00:00 Debian Oval Importer Affected by VCID-5jwk-a9p5-wucg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:44:37.193972+00:00 Debian Oval Importer Affected by VCID-czyw-19hc-7yd8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:42:00.333673+00:00 Debian Oval Importer Affected by VCID-6kqn-b3jz-7yce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:41:50.997808+00:00 Debian Oval Importer Affected by VCID-svnx-6c3x-sfe3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:34:34.973224+00:00 Debian Oval Importer Affected by VCID-a595-94ux-mkd6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:27:23.444598+00:00 Debian Oval Importer Affected by VCID-uweh-5m2b-1fgz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:25:26.680515+00:00 Debian Oval Importer Affected by VCID-k3fd-zdmc-sqcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:14:03.933425+00:00 Debian Oval Importer Affected by VCID-2wm3-1yvf-93gh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:02:44.999233+00:00 Debian Oval Importer Affected by VCID-cqks-9fvy-tyf7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:01:49.006718+00:00 Debian Oval Importer Affected by VCID-6wdq-yru9-1qg2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:56:34.324647+00:00 Debian Oval Importer Affected by VCID-zbxb-j4tw-aucd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:46:13.181491+00:00 Debian Oval Importer Affected by VCID-41wk-t7qa-8ka8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:33:27.945002+00:00 Debian Oval Importer Affected by VCID-abqn-f785-3ydv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:32:21.339223+00:00 Debian Oval Importer Affected by VCID-7zvg-h1e7-qff3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:31:49.890389+00:00 Debian Oval Importer Affected by VCID-jmyx-xhwn-rkhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:21:12.306176+00:00 Debian Oval Importer Affected by VCID-uj1s-58a2-uuf8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:04:52.765600+00:00 Debian Oval Importer Affected by VCID-ad18-t4ua-gbdh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:00:30.213922+00:00 Debian Oval Importer Affected by VCID-yjkt-2a6r-wybe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:55:43.631879+00:00 Debian Oval Importer Affected by VCID-xp11-9392-cuf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:54:15.044841+00:00 Debian Oval Importer Affected by VCID-w4yd-5rsk-h3f8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:54:09.880187+00:00 Debian Oval Importer Affected by VCID-9x7p-53cz-3yby https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:43:08.449614+00:00 Debian Oval Importer Affected by VCID-13a9-rqnw-ukf1 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T10:32:04.784010+00:00 Debian Oval Importer Affected by VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:15:38.193702+00:00 Debian Oval Importer Affected by VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:05:27.695161+00:00 Debian Oval Importer Affected by VCID-fgp4-g3js-z3ej https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:01:01.421162+00:00 Debian Oval Importer Affected by VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:56:24.141599+00:00 Debian Oval Importer Affected by VCID-auqa-26un-zkat https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:55:11.394217+00:00 Debian Oval Importer Affected by VCID-kt2w-xvg1-nkbv https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:49:02.407070+00:00 Debian Oval Importer Affected by VCID-9x7p-53cz-3yby https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:48:58.151819+00:00 Debian Oval Importer Affected by VCID-fvm5-667f-ebaf https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:46:47.490485+00:00 Debian Oval Importer Affected by VCID-m7w5-ykrk-sfar https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:45:43.138773+00:00 Debian Oval Importer Affected by VCID-gvtz-hzgv-xubg https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:44:57.057142+00:00 Debian Oval Importer Affected by VCID-njhj-r878-mybu https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:43:26.659084+00:00 Debian Oval Importer Affected by VCID-2wm3-1yvf-93gh https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:43:21.458275+00:00 Debian Oval Importer Affected by VCID-71yp-cjqr-cuds https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:55.059372+00:00 Debian Oval Importer Affected by VCID-qxjd-jpvb-ubeg https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:50.805537+00:00 Debian Oval Importer Affected by VCID-d1en-7h6j-m3cj https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:41:15.898633+00:00 Debian Oval Importer Affected by VCID-9nwu-3fdu-m7c1 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:39:51.875295+00:00 Debian Oval Importer Affected by VCID-1exf-drx5-h3du https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:39:42.663965+00:00 Debian Oval Importer Affected by VCID-9adn-sytv-2qau https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:35:19.733149+00:00 Debian Oval Importer Affected by VCID-dkhv-nw4r-wqc5 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:35:07.420551+00:00 Debian Oval Importer Affected by VCID-41wk-t7qa-8ka8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:34:16.926545+00:00 Debian Oval Importer Affected by VCID-adys-usze-bqaf https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:32:01.850101+00:00 Debian Oval Importer Affected by VCID-w4yd-5rsk-h3f8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:27:22.313331+00:00 Debian Oval Importer Affected by VCID-svnx-6c3x-sfe3 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:20:35.750628+00:00 Debian Oval Importer Affected by VCID-t98s-1yz1-8ka9 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:20:18.029706+00:00 Debian Oval Importer Affected by VCID-pvgc-k1fr-mkg8 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0