Source: freeimage
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for freeimage.

CVE-2024-9029[0]:
| A flaw was found in freeimage library. Processing a crafted image
| can cause a buffer over-read of 1 byte in the read_iptc_profile
| function in the Source/Metadata/IPTC.cpp file because the size of
| the profile is not being sanitized, causing a crash in the
| application linked to the library, resulting in a denial of service.

https://sourceforge.net/p/freeimage/bugs/351/


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-9029
    https://www.cve.org/CVERecord?id=CVE-2024-9029

Please adjust the affected versions in the BTS as needed.

Reply via email to