Santiago R.R. pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
fe1e7cb4 by Santiago Ruano Rincón at 2024-10-07T22:59:07-03:00
Add freeimage upstream bugrefs for issues reported in github.com/Ruanxingzhi

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -56918,129 +56918,152 @@ CVE-2024-28584 (Null Pointer Dereference 
vulnerability in open source FreeImage
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/385/
 CVE-2024-28583 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/384/
 CVE-2024-28582 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/383/
 CVE-2024-28581 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/382/
 CVE-2024-28580 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/381/
 CVE-2024-28579 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/380/
 CVE-2024-28578 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/379/
 CVE-2024-28577 (Null Pointer Dereference vulnerability in open source 
FreeImage v.3.19 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/378/
 CVE-2024-28576 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/377/
 CVE-2024-28575 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/376/
 CVE-2024-28574 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/375/
 CVE-2024-28573 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/374/
 CVE-2024-28572 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/373/
 CVE-2024-28571 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/372/
 CVE-2024-28570 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/371/
 CVE-2024-28569 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/370/
 CVE-2024-28568 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/369/
 CVE-2024-28567 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/368/
 CVE-2024-28566 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/367/
 CVE-2024-28565 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/366/
 CVE-2024-28564 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/365/
 CVE-2024-28563 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        [buster] - freeimage <postponed> (Revisit when fixed upstream, low 
severity DoS in user interactive software)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/364/
 CVE-2024-28562 (Buffer Overflow vulnerability in open source FreeImage 
v.3.19.0 [r1909 ...)
        - freeimage <unfixed> (bug #1068461)
        [bookworm] - freeimage <no-dsa> (Revisit when fixed upstream)
        [bullseye] - freeimage <no-dsa> (Revisit when fixed upstream)
        NOTE: 
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
+       NOTE: https://sourceforge.net/p/freeimage/bugs/363/
 CVE-2024-28389 (SQL injection vulnerability in KnowBand spinwheel v.3.0.3 and 
before a ...)
        NOT-FOR-US: KnowBand spinwheel
 CVE-2024-28283 (There is stack-based buffer overflow vulnerability in 
pc_change_act fu ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe1e7cb45eddd89d931d33860a1adc4de1039940
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to