Source: freeimage X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerability was published for freeimage. CVE-2024-9029[0]: | A flaw was found in freeimage library. Processing a crafted image | can cause a buffer over-read of 1 byte in the read_iptc_profile | function in the Source/Metadata/IPTC.cpp file because the size of | the profile is not being sanitized, causing a crash in the | application linked to the library, resulting in a denial of service. https://sourceforge.net/p/freeimage/bugs/351/ If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-9029 https://www.cve.org/CVERecord?id=CVE-2024-9029 Please adjust the affected versions in the BTS as needed.