-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-6168-1                   [email protected]
https://www.debian.org/security/                       Moritz Muehlenhoff
March 18, 2026                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freetype
CVE ID         : CVE-2026-23865

It was discovered that an integer overflow in the Freetype font engine
could result in information disclosure or denial of service.

The oldstable distribution (bookworm) is not affected.

For the stable distribution (trixie), this problem has been fixed in
version 2.13.3+dfsg-1+deb13u1.

We recommend that you upgrade your freetype packages.

For the detailed security status of freetype please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/freetype

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmm7GbwACgkQEMKTtsN8
TjZwpg//e+JSCjtjDKo5qQIfXVMamjUNM3AEPeElOrN9MAdHVE7PJ7Rc/2HHtzBn
OHQDOHLmWQv8L+Be6JveUOrusNB00+AbeaONr8BWEGJTPz6KTyNpQ+p99ZeRhpcc
ej0psrBU+S5q1N04a87P5dp2OdAa3Sh9fghYpGrQCZg2pQNQbZPOLH4hYvKcZ10b
arl5rdqmbklHQ6BWgjD9btXgDO9RJYovE6r9ATL3oDjPpEw+DPq9O2S7ZYNTe0zN
Cb0s5q0NpbsSJYpL5nMhOeAO/0sFfmpAH5ll05q1n0TO90OpUC2g4uNdmVV9bmrU
fbrys5Ry1QjebYeq2FuavTIcpuMbZv1T1iXoIfq9bbErbU11YOY/6QuqxEIibhR4
gf53OQNUppllmyqcmYtkAjdyN6ShWYaqGpVQy5pKWijVDcPhaHskKtGsD+VbOm4d
P6m3SGaZwk7bIavJ2VpEkY1XKM6aLZZx1TCQg/RkGQsPI47OWza5oxheygvTLB7J
zlcJgztuQ1LZxwJHMBtbFtk3JHjjy9EZfXDIW0MUEs0FPdDrcTMF11p8Tpy8hEtk
WUFoX4C6oHBeZ8lZs2zCefJ8wUL+PfWKV8DEw1K6ux1Rx9IZqm4Oj1Lgp4bD9mfN
Enq8z1K8dKPN3+3ztgErZyja8nrx9k/mHAU2oj/hxUvCV+KyEWo=
=WIQq
-----END PGP SIGNATURE-----

Reply via email to