aboutsummaryrefslogtreecommitdiffstats
path: root/english/security/2020/dsa-4777.wml
blob: 01075eff149fc24fd5f971a398518802eccb65ff (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
<define-tag description>security update</define-tag>
<define-tag moreinfo>
<p>Sergei Glazunov discovered a heap-based buffer overflow vulnerability in
the handling of embedded PNG bitmaps in FreeType. Opening malformed
fonts may result in denial of service or the execution of arbitrary
code.</p>

<p>For the stable distribution (buster), this problem has been fixed in
version 2.9.1-3+deb10u2.</p>

<p>We recommend that you upgrade your freetype packages.</p>

<p>For the detailed security status of freetype please refer to its
security tracker page at:
<a href="https://security-tracker.debian.org/tracker/freetype">\
https://security-tracker.debian.org/tracker/freetype</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2020/dsa-4777.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy