Debian 10216 Published by

A freeimage security update has been released for Debian GNU/Linux 10 LTS to address multiple vulnerabilities.



[SECURITY] [DLA 3662-1] freeimage security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3662-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Anton Gladky
November 24, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : freeimage
Version : 3.18.0+ds2-1+deb10u2
CVE ID : CVE-2020-21427 CVE-2020-21428 CVE-2020-22524

Multiple vulnerabilities were discovered in freeimage, library for graphics
image formats.

CVE-2020-21427
Buffer overflow vulnerability in function LoadPixelDataRLE8
in PluginBMP.cpp allows remote attackers to run arbitrary code and cause
other impacts via crafted image file.

CVE-2020-21428
Buffer overflow vulnerability in function LoadRGB in
PluginDDS.cpp allows remote attackers to run arbitrary code and cause other
impacts via crafted image file.

CVE-2020-22524
Buffer overflow vulnerability in FreeImage_Load function
allows remote attackers to run arbitrary code and cause other
impacts via crafted PFM file.

For Debian 10 buster, these problems have been fixed in version
3.18.0+ds2-1+deb10u2.

We recommend that you upgrade your freeimage packages.

For the detailed security status of freeimage please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/freeimage

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS