|
Server : LiteSpeed System : Linux srv107862549.host 5.15.0-124-generic #134-Ubuntu SMP Fri Sep 27 20:20:17 UTC 2024 x86_64 User : malam2778 ( 1069) PHP Version : 8.0.30 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /proc/self/root/run/ubuntu-advantage/ |
Upload File : |
{
"messages": [
{
"begin": "2025-03-25T00:00:00Z",
"selectors": {
"codenames": ["xenial"],
"packages": [
["libfreetype6", "<", "2.6.1-0.1ubuntu2.5+esm2"]
]
},
"lines": [
"Patch available for a potential RCE vulnerability ",
"in FreeType, tracked by CVE-2025-27363.",
"For more see: https://ubuntu.com/security/CVE-2025-27363"
]
},
{
"begin": "2025-03-25T00:00:00Z",
"selectors": {
"codenames": ["bionic"],
"packages": [
["libfreetype6", "<", "2.8.1-2ubuntu2.2+esm1"]
]
},
"lines": [
"Patch available for a potential RCE vulnerability ",
"in FreeType, tracked by CVE-2025-27363.",
"For more see: https://ubuntu.com/security/CVE-2025-27363"
]
},
{
"begin": "2025-03-25T00:00:00Z",
"selectors": {
"codenames": ["focal"],
"packages": [
["libfreetype6", "<", "2.10.1-2ubuntu0.4"]
]
},
"lines": [
"Patch available for a potential RCE vulnerability ",
"in FreeType, tracked by CVE-2025-27363.",
"For more see: https://ubuntu.com/security/CVE-2025-27363"
]
},
{
"begin": "2025-03-25T00:00:00Z",
"selectors": {
"codenames": ["jammy"],
"packages": [
["libfreetype6", "<", "2.11.1+dfsg-1ubuntu0.3"]
]
},
"lines": [
"Patch available for a potential RCE vulnerability ",
"in FreeType, tracked by CVE-2025-27363.",
"For more see: https://ubuntu.com/security/CVE-2025-27363"
]
}
]
}