[Git][security-tracker-team/security-tracker][master] Add some freeimage URL patch references from fedora

Santiago R.R. (@santiago) santiago at debian.org
Tue Apr 9 17:34:24 BST 2024



Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker


Commits:
20155252 by Santiago Ruano Rincón at 2024-04-09T13:33:50-03:00
Add some freeimage URL patch references from fedora

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -21970,6 +21970,7 @@ CVE-2023-47997 (An issue discovered in BitmapAccess.cpp::FreeImage_AllocateBitma
 	[bullseye] - freeimage <postponed> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream)
 	NOTE: https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2023-47997.patch
 CVE-2023-47996 (An integer overflow vulnerability in Exif.cpp::jpeg_read_exif_dir in F ...)
 	- freeimage <unfixed> (bug #1060691)
 	[bookworm] - freeimage <postponed> (Revisit when fixed upstream)
@@ -21982,6 +21983,7 @@ CVE-2023-47995 (Memory Allocation with Excessive Size Value discovered in Bitmap
 	[bullseye] - freeimage <postponed> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream)
 	NOTE: https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2023-47995.patch
 CVE-2023-47994 (An integer overflow vulnerability in LoadPixelDataRLE4 function in Plu ...)
 	- freeimage <unfixed> (bug #1060691)
 	[bookworm] - freeimage <postponed> (Revisit when fixed upstream)
@@ -188683,6 +188685,7 @@ CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	[buster] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/334/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2021-40266.patch
 CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...)
 	- freeimage <unfixed> (bug #1055304)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
@@ -188701,6 +188704,7 @@ CVE-2021-40263 (A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	[buster] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/336/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2021-40263.patch
 CVE-2021-40262 (A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...)
 	- freeimage <unfixed> (bug #1055301)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
@@ -205900,6 +205904,7 @@ CVE-2021-33367 (Buffer Overflow vulnerability in Freeimage v3.18.0 allows attack
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	[buster] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36109/thread/1a4db03d58/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2021-33367.patch
 CVE-2021-33366 (Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC  ...)
 	{DSA-5411-1}
 	- gpac <unfixed> (unimportant)
@@ -261315,6 +261320,7 @@ CVE-2020-24295 (Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine()
 	[bullseye] - freeimage <postponed> (Revisit when patches are available)
 	[buster] - freeimage <postponed> (Revisit when patches are available)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2020-24295.patch
 CVE-2020-24294 (Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDP ...)
 	- freeimage <unfixed> (bug #1059152)
 	[bookworm] - freeimage <postponed> (Revisit when patches are available)
@@ -261327,12 +261333,14 @@ CVE-2020-24293 (Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser
 	[bullseye] - freeimage <postponed> (Revisit when patches are available)
 	[buster] - freeimage <postponed> (Revisit when patches are available)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2020-24293.patch
 CVE-2020-24292 (Buffer Overflow vulnerability in load function in PluginICO.cpp in Fre ...)
 	- freeimage <unfixed> (bug #1059152)
 	[bookworm] - freeimage <postponed> (Revisit when patches are available)
 	[bullseye] - freeimage <postponed> (Revisit when patches are available)
 	[buster] - freeimage <postponed> (Revisit when patches are available)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
+	NOTE: Patch in Fedora (not upstream'ed): https://src.fedoraproject.org/rpms/freeimage/blob/f39/f/CVE-2020-24292.patch
 CVE-2020-24291
 	RESERVED
 CVE-2020-24290



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20155252d58b523a2946a35fa181f9e96ef36d78

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20155252d58b523a2946a35fa181f9e96ef36d78
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240409/55a5fa96/attachment.htm>


More information about the debian-security-tracker-commits mailing list