摘要:
freeimage security update
安全等级: High
公告ID: KylinSec-SA-2024-4135
发布日期: 2024年11月1日
关联CVE: CVE-2020-24292 CVE-2020-24293 CVE-2020-24295 CVE-2021-33367 CVE-2021-40263 CVE-2021-40266 CVE-2023-47995 CVE-2023-47997
FreeImage is a library project for developers who would like to support popular graphics image formats (PNG, JPEG, TIFF, BMP and others). Some highlights are: extremely simple in use, not limited to the local PC (unique FreeImageIO) and Plugin driven!
Security Fix(es):
Buffer Overflow vulnerability in load function in PluginICO.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted ico file.(CVE-2020-24292)
Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted psd file.(CVE-2020-24293)
Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in FreeImage 3.19.0 [r1859] allows remote attackers to ru narbitrary code via use of crafted psd file.(CVE-2020-24295)
Buffer Overflow vulnerability in Freeimage v3.18.0 allows attacker to cause a denial of service via a crafted JXR file.(CVE-2021-33367)
A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad function in PluginTIFF.cpp.(CVE-2021-40263)
FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vulnerabile to null pointer dereference.(CVE-2021-40266)
Memory Allocation with Excessive Size Value discovered in BitmapAccess.cpp::FreeImage_AllocateBitmap in FreeImage 3.18.0 allows attackers to cause a denial of service.(CVE-2023-47995)
An issue discovered in BitmapAccess.cpp::FreeImage_AllocateBitmap in FreeImage 3.18.0 leads to an infinite loop and allows attackers to cause a denial of service.(CVE-2023-47997)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2020-24292 | KY3.4-5A | freeimage | Fixed |
CVE-2020-24292 | V6 | freeimage | Fixed |
CVE-2020-24293 | KY3.4-5A | freeimage | Fixed |
CVE-2020-24293 | V6 | freeimage | Fixed |
CVE-2020-24295 | KY3.4-5A | freeimage | Fixed |
CVE-2020-24295 | V6 | freeimage | Fixed |
CVE-2021-33367 | KY3.4-5A | freeimage | Fixed |
CVE-2021-33367 | V6 | freeimage | Fixed |
CVE-2021-40263 | KY3.4-5A | freeimage | Fixed |
CVE-2021-40263 | V6 | freeimage | Fixed |
CVE-2021-40266 | KY3.4-5A | freeimage | Fixed |
CVE-2021-40266 | V6 | freeimage | Fixed |
CVE-2023-47995 | KY3.4-5A | freeimage | Fixed |
CVE-2023-47995 | V6 | freeimage | Fixed |
CVE-2023-47997 | KY3.4-5A | freeimage | Fixed |
CVE-2023-47997 | V6 | freeimage | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
freeimage | x86_64 | 3.18.0-7.kb2.ky3_4 |
freeimage-devel | x86_64 | 3.18.0-7.kb2.ky3_4 |
freeimage | aarch64 | 3.18.0-7.kb2.ky3_4 |
freeimage-devel | aarch64 | 3.18.0-7.kb2.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
freeimage | x86_64 | 3.18.0-13.ks6 |
freeimage-devel | x86_64 | 3.18.0-13.ks6 |
freeimage | aarch64 | 3.18.0-13.ks6 |
freeimage-devel | aarch64 | 3.18.0-13.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名