Fedora 38: freeimage 2023-604a7d56b0
Summary
FreeImage is a library for developers who would like to support popular
graphics image formats like PNG, BMP, JPEG, TIFF and others as needed by
today's multimedia applications.
Update Information:
Downstream fixes for CVE-2021-40266 CVE-2020-24292 CVE-2020-24293 CVE-2020-24295 CVE-2021-40263
Change Log
* Thu Sep 28 2023 Sandro Mani
References
[ 1 ] Bug #2235420 - CVE-2020-24292 mingw-freeimage: freeimage: buffer overflow in load() in PluginICO.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235420 [ 2 ] Bug #2235422 - CVE-2020-24292 freeimage: buffer overflow in load() in PluginICO.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235422 [ 3 ] Bug #2235425 - CVE-2020-24293 freeimage: buffer overflow in psdThumbnail::Read() in PSDParser.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235425 [ 4 ] Bug #2235426 - CVE-2020-24293 mingw-freeimage: freeimage: buffer overflow in psdThumbnail::Read() in PSDParser.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235426 [ 5 ] Bug #2235434 - CVE-2020-24295 freeimage: buffer overflow in ReadImageLine() in PSDParser.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235434 [ 6 ] Bug #2235435 - CVE-2020-24295 mingw-freeimage: freeimage: buffer overflow in ReadImageLine() in PSDParser.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235435 [ 7 ] Bug #2235442 - CVE-2021-40263 freeimage: buffer overflow via Load() in PluginTIFF.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235442 [ 8 ] Bug #2235444 - CVE-2021-40263 mingw-freeimage: freeimage: buffer overflow via Load() in PluginTIFF.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235444 [ 9 ] Bug #2235456 - CVE-2021-40266 freeimage: NULL pointer dereference in ReadPalette() in PluginTIFF.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235456 [ 10 ] Bug #2235457 - CVE-2021-40266 mingw-freeimage: freeimage: NULL pointer dereference in ReadPalette() in PluginTIFF.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2235457
Update Instructions
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-604a7d56b0' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html