Ola Lundqvist pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6b7eb714 by Ola Lundqvist at 2024-03-09T23:57:45+01:00
Removed freeimage from dla-needed and marked its CVEs as postponed for buster 
following bullseye.

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -13459,31 +13459,37 @@ CVE-2023-47997 (An issue discovered in 
BitmapAccess.cpp::FreeImage_AllocateBitma
        - freeimage <unfixed> (bug #1060691)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997
 CVE-2023-47996 (An integer overflow vulnerability in 
Exif.cpp::jpeg_read_exif_dir in F ...)
        - freeimage <unfixed> (bug #1060691)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996
 CVE-2023-47995 (Memory Allocation with Excessive Size Value discovered in 
BitmapAccess ...)
        - freeimage <unfixed> (bug #1060862)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995
 CVE-2023-47994 (An integer overflow vulnerability in LoadPixelDataRLE4 
function in Plu ...)
        - freeimage <unfixed> (bug #1060691)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994
 CVE-2023-47993 (A Buffer out-of-bound read vulnerability in 
Exif.cpp::ReadInt32 in Fre ...)
        - freeimage <unfixed> (bug #1060691)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993
 CVE-2023-47992 (An integer overflow vulnerability in 
FreeImageIO.cpp::_MemoryReadProc  ...)
        - freeimage <unfixed> (bug #1060691)
        [bookworm] - freeimage <postponed> (Revisit when fixed upstream)
        [bullseye] - freeimage <postponed> (Revisit when fixed upstream)
+       [buster] - freeimage <postponed> (Revisit when fixed upstream)
        NOTE: 
https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992
 CVE-2023-41781 (There is a Cross-sitescripting (XSS) vulnerability in ZTE 
MF258. Due t ...)
        NOT-FOR-US: ZTE


=====================================
data/dla-needed.txt
=====================================
@@ -77,9 +77,6 @@ edk2
 expat
   NOTE: 20240306: Added by Front-Desk (opal)
 --
-freeimage
-  NOTE: 20240121: Added by Front-Desk (apo)
---
 freeipa (Chris Lamb)
   NOTE: 20240307: Added by Front-Desk (opal)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b7eb714928909dabbd6342f9277a31cb1f7eb1b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b7eb714928909dabbd6342f9277a31cb1f7eb1b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to