{"schema_version":"1.7.2","id":"OESA-2023-1898","modified":"2023-12-08T11:06:26Z","published":"2023-12-08T11:06:26Z","upstream":["CVE-2020-21427","CVE-2020-21428"],"summary":"freeimage security update","details":"FreeImage is a library project for developers who would like to support popular graphics image formats (PNG, JPEG, TIFF, BMP and others). Some highlights are: extremely simple in use, not limited to the local PC (unique FreeImageIO) and Plugin driven!\r\n\r\nSecurity Fix(es):\r\n\r\nBuffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.(CVE-2020-21427)\r\n\r\nBuffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.(CVE-2020-21428)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"freeimage","purl":"pkg:rpm/openEuler/freeimage\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.0-5.oe1"}]}],"ecosystem_specific":{"aarch64":["freeimage-devel-3.18.0-5.oe1.aarch64.rpm","freeimage-3.18.0-5.oe1.aarch64.rpm"],"src":["freeimage-3.18.0-5.oe1.src.rpm"],"x86_64":["freeimage-3.18.0-5.oe1.x86_64.rpm","freeimage-devel-3.18.0-5.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"freeimage","purl":"pkg:rpm/openEuler/freeimage\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.0-5.oe1"}]}],"ecosystem_specific":{"aarch64":["freeimage-devel-3.18.0-5.oe1.aarch64.rpm","freeimage-3.18.0-5.oe1.aarch64.rpm"],"src":["freeimage-3.18.0-5.oe1.src.rpm"],"x86_64":["freeimage-3.18.0-5.oe1.x86_64.rpm","freeimage-devel-3.18.0-5.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"freeimage","purl":"pkg:rpm/openEuler/freeimage\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.0-9.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["freeimage-debugsource-3.18.0-9.oe2203.aarch64.rpm","freeimage-devel-3.18.0-9.oe2203.aarch64.rpm","freeimage-debuginfo-3.18.0-9.oe2203.aarch64.rpm","freeimage-3.18.0-9.oe2203.aarch64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-devel-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-devel-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-3.18.0-9.oe2203sp2.aarch64.rpm"],"src":["freeimage-3.18.0-9.oe2203.src.rpm","freeimage-3.18.0-9.oe2203sp1.src.rpm","freeimage-3.18.0-9.oe2203sp2.src.rpm"],"x86_64":["freeimage-3.18.0-9.oe2203.x86_64.rpm","freeimage-devel-3.18.0-9.oe2203.x86_64.rpm","freeimage-debugsource-3.18.0-9.oe2203.x86_64.rpm","freeimage-debuginfo-3.18.0-9.oe2203.x86_64.rpm","freeimage-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-devel-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-devel-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp2.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"freeimage","purl":"pkg:rpm/openEuler/freeimage\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.0-9.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["freeimage-debugsource-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-3.18.0-9.oe2203sp1.aarch64.rpm","freeimage-devel-3.18.0-9.oe2203sp1.aarch64.rpm"],"src":["freeimage-3.18.0-9.oe2203sp1.src.rpm"],"x86_64":["freeimage-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp1.x86_64.rpm","freeimage-devel-3.18.0-9.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP2","name":"freeimage","purl":"pkg:rpm/openEuler/freeimage\u0026distro=openEuler-22.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.18.0-9.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["freeimage-debuginfo-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-devel-3.18.0-9.oe2203sp2.aarch64.rpm","freeimage-3.18.0-9.oe2203sp2.aarch64.rpm"],"src":["freeimage-3.18.0-9.oe2203sp2.src.rpm"],"x86_64":["freeimage-devel-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-debugsource-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-3.18.0-9.oe2203sp2.x86_64.rpm","freeimage-debuginfo-3.18.0-9.oe2203sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-21427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-21428"}],"database_specific":{"severity":"High"}}