aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAnton Gladky <gladk@debian.org>2023-11-25 22:37:24 +0100
committerAnton Gladky <gladk@debian.org>2023-11-25 22:37:24 +0100
commit8353fd5d814dd013e28972492c386d4446d75403 (patch)
tree8f66f0d3532a508fe7c66e1eaac40186c13dce92
parentcc9feca5859eb091ebf2b362ae1916cf06d2dd19 (diff)
DLA-3662
-rw-r--r--english/lts/security/2023/dla-3662.data10
-rw-r--r--english/lts/security/2023/dla-3662.wml37
2 files changed, 47 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3662.data b/english/lts/security/2023/dla-3662.data
new file mode 100644
index 00000000000..d712b78b19a
--- /dev/null
+++ b/english/lts/security/2023/dla-3662.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-3662-1 freeimage</define-tag>
+<define-tag report_date>2023-11-25</define-tag>
+<define-tag secrefs>CVE-2020-21427 CVE-2020-21428 CVE-2020-22524 CVE-2020-21427 CVE-2020-21428 CVE-2020-22524</define-tag>
+<define-tag packages>freeimage</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2023/dla-3662.wml b/english/lts/security/2023/dla-3662.wml
new file mode 100644
index 00000000000..bc43c3bd8ac
--- /dev/null
+++ b/english/lts/security/2023/dla-3662.wml
@@ -0,0 +1,37 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>Multiple vulnerabilities were discovered in freeimage, library for graphics
+image formats.</p>
+
+ <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21427">CVE-2020-21427</a>
+ Buffer overflow vulnerability in function LoadPixelDataRLE8
+ in PluginBMP.cpp allows remote attackers to run arbitrary code and cause
+ other impacts via crafted image file.</p>
+
+ <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21428">CVE-2020-21428</a>
+ Buffer overflow vulnerability in function LoadRGB in
+ PluginDDS.cpp allows remote attackers to run arbitrary code and cause other
+ impacts via crafted image file.</p>
+
+ <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-22524">CVE-2020-22524</a>
+ Buffer overflow vulnerability in FreeImage_Load function
+ allows remote attackers to run arbitrary code and cause other
+ impacts via crafted PFM file.</p>
+
+<p>For Debian 10 buster, these problems have been fixed in version
+3.18.0+ds2-1+deb10u2.</p>
+
+<p>We recommend that you upgrade your freeimage packages.</p>
+
+<p>For the detailed security status of freeimage please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/freeimage">https://security-tracker.debian.org/tracker/freeimage</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2023/dla-3662.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy