https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Bug ID: 2271050
Summary: CVE-2024-28564 freeimage: buffer overflow in
Imf_2_2::CharPtrIO::readChars() function when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271044
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271040
Bug ID: 2271040
Summary: CVE-2024-28562 freeimage: buffer overflow in
Imf_2_2::copyIntoFrameBuffer() component when reading
images in EXR format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271038
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271040
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Bug ID: 2271041
Summary: CVE-2024-28562 freeimage: buffer overflow in
Imf_2_2::copyIntoFrameBuffer() component when reading
images in EXR format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271038
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271041
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271037
Bug ID: 2271037
Summary: CVE-2024-28584 freeimage: null pointer dereference in
J2KImageToFIBITMAP() function when reading images in
J2K format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271035
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271037
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271036
Bug ID: 2271036
Summary: CVE-2024-28584 freeimage: null pointer dereference in
J2KImageToFIBITMAP() function when reading images in
J2K format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271035
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271036
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271031
Bug ID: 2271031
Summary: CVE-2024-28583 freeimage: buffer overflow in
readLine() function when reading images in XPM format
[fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271029
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271031
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271034
Bug ID: 2271034
Summary: CVE-2024-28583 freeimage: buffer overflow in
readLine() function when reading images in XPM format
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271029
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271034
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271028
Bug ID: 2271028
Summary: CVE-2024-28582 freeimage: buffer overflow in
rgbe_RGBEToFloat() function when reading images in HDR
format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271027
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271028
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271030
Bug ID: 2271030
Summary: CVE-2024-28582 freeimage: buffer overflow in
rgbe_RGBEToFloat() function when reading images in HDR
format [fedora-all]
Product: Fedora
Version: 39
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: bruno(a)wolff.to
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271027
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271030
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...
https://bugzilla.redhat.com/show_bug.cgi?id=2271026
Bug ID: 2271026
Summary: CVE-2024-28581 freeimage: buffer overflow in
_assignPixel<>() function when reading images in TARGA
format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271020
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271026
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-...