Debian 10827 Published by

Debian released a security advisory regarding an integer overflow vulnerability found within the freetype font engine software. Attackers could exploit this flaw to access sensitive information or cause denial of service conditions on vulnerable systems. Administrators running the stable Debian 13 trixie distribution must upgrade their packages to version 2.13.3+dfsg-1+deb13u1 to resolve the issue immediately.

[DSA 6168-1] freetype security update



[DSA 6168-1] freetype security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-6168-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 18, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : freetype
CVE ID : CVE-2026-23865

It was discovered that an integer overflow in the Freetype font engine
could result in information disclosure or denial of service.

The oldstable distribution (bookworm) is not affected.

For the stable distribution (trixie), this problem has been fixed in
version 2.13.3+dfsg-1+deb13u1.

We recommend that you upgrade your freetype packages.

For the detailed security status of freetype please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/freetype

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org