[Git][security-tracker-team/security-tracker][master] Add freeimage upstream bugrefs for issues reported in github.com/Ruanxingzhi

Santiago R.R. (@santiago) santiago at debian.org
Tue Oct 8 02:59:20 BST 2024



Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fe1e7cb4 by Santiago Ruano Rincón at 2024-10-07T22:59:07-03:00
Add freeimage upstream bugrefs for issues reported in github.com/Ruanxingzhi

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -56918,129 +56918,152 @@ CVE-2024-28584 (Null Pointer Dereference vulnerability in open source FreeImage
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/385/
 CVE-2024-28583 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/384/
 CVE-2024-28582 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/383/
 CVE-2024-28581 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/382/
 CVE-2024-28580 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/381/
 CVE-2024-28579 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/380/
 CVE-2024-28578 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/379/
 CVE-2024-28577 (Null Pointer Dereference vulnerability in open source FreeImage v.3.19 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/378/
 CVE-2024-28576 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/377/
 CVE-2024-28575 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/376/
 CVE-2024-28574 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/375/
 CVE-2024-28573 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/374/
 CVE-2024-28572 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/373/
 CVE-2024-28571 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/372/
 CVE-2024-28570 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/371/
 CVE-2024-28569 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/370/
 CVE-2024-28568 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/369/
 CVE-2024-28567 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/368/
 CVE-2024-28566 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/367/
 CVE-2024-28565 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/366/
 CVE-2024-28564 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/365/
 CVE-2024-28563 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/364/
 CVE-2024-28562 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
 	- freeimage <unfixed> (bug #1068461)
 	[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
 	[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
 	NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+	NOTE: https://sourceforge.net/p/freeimage/bugs/363/
 CVE-2024-28389 (SQL injection vulnerability in KnowBand spinwheel v.3.0.3 and before a ...)
 	NOT-FOR-US: KnowBand spinwheel
 CVE-2024-28283 (There is stack-based buffer overflow vulnerability in pc_change_act fu ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241008/ad350a8e/attachment.htm>


More information about the debian-security-tracker-commits mailing list