diff options
author | Anton Gladky <gladk@debian.org> | 2023-11-25 22:37:24 +0100 |
---|---|---|
committer | Anton Gladky <gladk@debian.org> | 2023-11-25 22:37:24 +0100 |
commit | 8353fd5d814dd013e28972492c386d4446d75403 (patch) | |
tree | 8f66f0d3532a508fe7c66e1eaac40186c13dce92 | |
parent | cc9feca5859eb091ebf2b362ae1916cf06d2dd19 (diff) |
DLA-3662
-rw-r--r-- | english/lts/security/2023/dla-3662.data | 10 | ||||
-rw-r--r-- | english/lts/security/2023/dla-3662.wml | 37 |
2 files changed, 47 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3662.data b/english/lts/security/2023/dla-3662.data new file mode 100644 index 00000000000..d712b78b19a --- /dev/null +++ b/english/lts/security/2023/dla-3662.data @@ -0,0 +1,10 @@ +<define-tag pagetitle>DLA-3662-1 freeimage</define-tag> +<define-tag report_date>2023-11-25</define-tag> +<define-tag secrefs>CVE-2020-21427 CVE-2020-21428 CVE-2020-22524 CVE-2020-21427 CVE-2020-21428 CVE-2020-22524</define-tag> +<define-tag packages>freeimage</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security + diff --git a/english/lts/security/2023/dla-3662.wml b/english/lts/security/2023/dla-3662.wml new file mode 100644 index 00000000000..bc43c3bd8ac --- /dev/null +++ b/english/lts/security/2023/dla-3662.wml @@ -0,0 +1,37 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> +<p>Multiple vulnerabilities were discovered in freeimage, library for graphics +image formats.</p> + + <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21427">CVE-2020-21427</a> + Buffer overflow vulnerability in function LoadPixelDataRLE8 + in PluginBMP.cpp allows remote attackers to run arbitrary code and cause + other impacts via crafted image file.</p> + + <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21428">CVE-2020-21428</a> + Buffer overflow vulnerability in function LoadRGB in + PluginDDS.cpp allows remote attackers to run arbitrary code and cause other + impacts via crafted image file.</p> + + <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-22524">CVE-2020-22524</a> + Buffer overflow vulnerability in FreeImage_Load function + allows remote attackers to run arbitrary code and cause other + impacts via crafted PFM file.</p> + +<p>For Debian 10 buster, these problems have been fixed in version +3.18.0+ds2-1+deb10u2.</p> + +<p>We recommend that you upgrade your freeimage packages.</p> + +<p>For the detailed security status of freeimage please refer to +its security tracker page at: +<a href="https://security-tracker.debian.org/tracker/freeimage">https://security-tracker.debian.org/tracker/freeimage</a></p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2023/dla-3662.data" +# $Id: $ |