[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-6586-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-09T02:11:32.352Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":34,"duplicates":35,"related":36,"reserved_at":9,"published_at":42,"modified_at":43,"state":9,"summary":44,"references_raw":46,"kevs":74,"epss":9,"epss_history":75,"metrics":76,"affected":77},"USN-6586-1","freeimage vulnerabilities\n\nIt was discovered that FreeImage incorrectly handled certain memory\noperations. If a user were tricked into opening a crafted TIFF file, a\nremote attacker could use this issue to cause a heap buffer overflow,\nresulting in a denial of service attack. This issue only affected Ubuntu\n16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)\n\nIt was discovered that FreeImage incorrectly processed images under\ncertain circumstances. If a user were tricked into opening a crafted TIFF\nfile, a remote attacker could possibly use this issue to cause a stack\nexhaustion condition, resulting in a denial of service attack. This issue\nonly affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)\n\nIt was discovered that FreeImage incorrectly processed certain images.\nIf a user or automated system were tricked into opening a specially\ncrafted image file, a remote attacker could possibly use this issue to\ncause a denial of service or execute arbitrary code. (CVE-2020-21427,\nCVE-2020-21428)\n\nIt was discovered that FreeImage incorrectly processed certain images.\nIf a user or automated system were tricked into opening a specially\ncrafted PFM file, an attacker could possibly use this issue to cause a\ndenial of service. (CVE-2020-22524)\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32],{"_key":15},"CVE-2019-12211",{"_key":17},"CVE-2019-12213",{"_key":19},"CVE-2020-21427",{"_key":21},"CVE-2020-21428",{"_key":23},"CVE-2020-22524",{"_key":25},"UBUNTU-CVE-2019-12211",{"_key":27},"UBUNTU-CVE-2019-12213",{"_key":29},"UBUNTU-CVE-2020-21427",{"_key":31},"UBUNTU-CVE-2020-21428",{"_key":33},"UBUNTU-CVE-2020-22524",[],[],[37,38,39,40,41],{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},"2024-01-16T12:44:38.617650Z","2026-02-04T03:10:19.303590Z",{"cisa_kev":45,"cisa_ransomware":45,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[47,53,58,62,66,70],{"url":48,"sources":49,"tags":51},"https://ubuntu.com/security/notices/USN-6586-1",[50],"osv_ubuntu",[52],"Advisory",{"url":54,"sources":55,"tags":56},"https://ubuntu.com/security/CVE-2019-12211",[50],[57],"REPORT",{"url":59,"sources":60,"tags":61},"https://ubuntu.com/security/CVE-2019-12213",[50],[57],{"url":63,"sources":64,"tags":65},"https://ubuntu.com/security/CVE-2020-21427",[50],[57],{"url":67,"sources":68,"tags":69},"https://ubuntu.com/security/CVE-2020-21428",[50],[57],{"url":71,"sources":72,"tags":73},"https://ubuntu.com/security/CVE-2020-22524",[50],[57],[],[],[],[78],{"ecosystem":79,"name":80,"vendor":81,"product":80,"cpe_part":9,"purl_type":82,"purl_namespace":81,"purl_name":80,"source":9,"versions":83},"Ubuntu","freeimage","ubuntu","deb",[84,90,93,96,99],{"version":85,"is_range":86,"range_type":87,"version_start":9,"version_start_type":9,"version_end":88,"version_end_type":89,"fixed_in":9},"lt3_15_4_3ubuntu0_1+esm3",true,"ecosystem","3.15.4-3ubuntu0.1+esm3","excluding",{"version":91,"is_range":86,"range_type":87,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":89,"fixed_in":9},"lt3_17_0+ds1_2ubuntu0_1+esm1","3.17.0+ds1-2ubuntu0.1+esm1",{"version":94,"is_range":86,"range_type":87,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":89,"fixed_in":9},"lt3_17_0+ds1_5+deb9u1ubuntu0_1~esm1","3.17.0+ds1-5+deb9u1ubuntu0.1~esm1",{"version":97,"is_range":86,"range_type":87,"version_start":9,"version_start_type":9,"version_end":98,"version_end_type":89,"fixed_in":9},"lt3_18_0+ds2_1ubuntu3_1","3.18.0+ds2-1ubuntu3.1",{"version":100,"is_range":86,"range_type":87,"version_start":9,"version_start_type":9,"version_end":101,"version_end_type":89,"fixed_in":9},"lt3_18_0+ds2_6ubuntu5_1","3.18.0+ds2-6ubuntu5.1"]