RetroPie/EmulationStation

[Urgent security issue] **FreeImage** arbitrary code execution vulnerability

Closed this issue · 4 comments

FreeImage has been seemingly abandoned and this is an issue for any project using this library
do not close unless the arbitrary code execution vulnerability is fixed by remove freeimage from the project
or if someone forks freeimage and the issues are fixed this is important

main 2 I think is the most important to point out

both of these can run arbitrary code one of them being from the BMP plugin
so I am assuming a person could get a user to load a malicious BMP or a file with a malicious bpm inside of it

Free Image should either be forked and fixed asap or abandoned for a different library

active project i could find that use freeimage
https://github.com/sirjuddington/SLADE
https://github.com/TrenchBroom/TrenchBroom
https://github.com/RetroPie/EmulationStation
https://github.com/MonoGame/MonoGame
https://github.com/meganz/MEGAsync
https://github.com/OGRECave/ogre
https://github.com/OGRECave/ogre-next
https://github.com/Open-Cascade-SAS/OCCT
https://github.com/arrayfire/forge
https://git.sr.ht/~exec64/imv
https://github.com/arrayfire/arrayfire

Free Image v3.18.0

Free Image before v1.18.0

this has nothing to do with freetype #871

this cant be resolved with contacting distro maintainers this library isnt being maintained and is a security threat
@cmitu

Please don't spam the issue tracker.

Please don't spam the issue tracker.

sorry for my actions
was feeling very self righteous about it
and i shouldnt have
sorry again for the issues and thank you for
your time