[Git][security-tracker-team/security-tracker][master] Add freeimage upstream bugrefs for issues reported in github.com/Ruanxingzhi
Santiago R.R. (@santiago)
santiago at debian.org
Tue Oct 8 02:59:20 BST 2024
Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker
Commits:
fe1e7cb4 by Santiago Ruano Rincón at 2024-10-07T22:59:07-03:00
Add freeimage upstream bugrefs for issues reported in github.com/Ruanxingzhi
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -56918,129 +56918,152 @@ CVE-2024-28584 (Null Pointer Dereference vulnerability in open source FreeImage
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/385/
CVE-2024-28583 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/384/
CVE-2024-28582 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/383/
CVE-2024-28581 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/382/
CVE-2024-28580 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/381/
CVE-2024-28579 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/380/
CVE-2024-28578 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/379/
CVE-2024-28577 (Null Pointer Dereference vulnerability in open source FreeImage v.3.19 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/378/
CVE-2024-28576 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/377/
CVE-2024-28575 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/376/
CVE-2024-28574 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/375/
CVE-2024-28573 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/374/
CVE-2024-28572 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/373/
CVE-2024-28571 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/372/
CVE-2024-28570 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/371/
CVE-2024-28569 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/370/
CVE-2024-28568 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/369/
CVE-2024-28567 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/368/
CVE-2024-28566 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/367/
CVE-2024-28565 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/366/
CVE-2024-28564 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/365/
CVE-2024-28563 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
[buster] - freeimage <postponed> (Revisit when fixed upstream, low severity DoS in user interactive software)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/364/
CVE-2024-28562 (Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...)
- freeimage <unfixed> (bug #1068461)
[bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
[bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
NOTE: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+ NOTE: https://sourceforge.net/p/freeimage/bugs/363/
CVE-2024-28389 (SQL injection vulnerability in KnowBand spinwheel v.3.0.3 and before a ...)
NOT-FOR-US: KnowBand spinwheel
CVE-2024-28283 (There is stack-based buffer overflow vulnerability in pc_change_act fu ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241008/ad350a8e/attachment.htm>
More information about the debian-security-tracker-commits
mailing list