https://bugzilla.redhat.com/show_bug.cgi?id=2126813
Bug ID: 2126813
Summary: CVE-2021-40647 man2html: sys-apps/man2html: multiple
vulnerabilities [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: man2html
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: sergio(a)serjux.com
Reporter: ybuenos(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
orion(a)nwra.com, sergio(a)serjux.com,
tchollingsworth(a)gmail.com, viktor.vix.jancik(a)gmail.com
Target Milestone: ---
Classification: Fedora
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of epel-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora EPEL. While
only one tracking bug has been filed, please correct all affected versions
at the same time. If you need to fix the versions independent of each
other, you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2126813
https://bugzilla.redhat.com/show_bug.cgi?id=2270961
Bug ID: 2270961
Summary: CVE-2024-28576 freeimage: buffer overflow in
opj_j2k_tcp_destroy() [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270960
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2270961
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2270979
Bug ID: 2270979
Summary: CVE-2024-28572 freeimage: buffer overflow in
FreeImage_SetTagValue() function when reading images
in JPEG format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270971
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2270979
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2270982
Bug ID: 2270982
Summary: CVE-2024-28571 freeimage: buffer overflow in
fill_input_buffer() when reading images in JPEG format
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270972
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2270982
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271028
Bug ID: 2271028
Summary: CVE-2024-28582 freeimage: buffer overflow in
rgbe_RGBEToFloat() function when reading images in HDR
format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271027
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271028
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2270989
Bug ID: 2270989
Summary: CVE-2024-28569 freeimage: buffer overflow in
Imf_2_2::Xdr::read() when reading images in EXR format
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270974
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2270989
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2235446
Bug ID: 2235446
Summary: CVE-2021-40264 freeimage: NULL pointer dereference via
FreeImage_CloneTag() in inFreeImageTag.cpp [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: gsuckevi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2235445
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2235446
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2270987
Bug ID: 2270987
Summary: CVE-2024-28570 freeimage: buffer overflow in
processMakerNote() [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270973
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2270987
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271025
Bug ID: 2271025
Summary: CVE-2024-28580 freeimage: buffer overflow in
ReadData() function when reading images in RAS format
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2271019
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271025
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2271003
Bug ID: 2271003
Summary: CVE-2024-28566 freeimage: buffer overflow in
AssignPixel() function when reading images in TIFF
format [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: freeimage
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: hobbes1069(a)gmail.com
Reporter: trathi(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bruno(a)wolff.to,
epel-packagers-sig(a)lists.fedoraproject.org,
hobbes1069(a)gmail.com, i(a)cicku.me, manisandro(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2270996
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271003
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…