Critical Security Updates Issued for Multiple FreeImage Vulnerabilities in Ubuntu
The Ubuntu security team recently released important security fixes for several FreeImage vulnerabilities in various Ubuntu releases, such as Ubuntu 16.04 and Ubuntu 18.04. These vulnerabilities, if not addressed, could potentially result in denial of service attacks.
However, due to the end-of-life status of both Ubuntu releases, the security updates are only accessible to those with an Ubuntu Pro subscription. Alternatively, users can safeguard Ubuntu 16.04 and Ubuntu 18.04 workloads by opting for TuxCare’s Extended Lifecycle Support, which provides five additional years of vendor-grade security patches after the EOL period.
Notably, the FreeImage library, an open-source, cross-platform image processing library supporting various image formats, is often used in graphics-related software development due to its versatility and ease of use. The library provides a range of tools for loading, saving, converting, and manipulating images in software applications.
The security fixes from Ubuntu addressed five FreeImage vulnerabilities, including buffer overflow issues and mishandling of certain memory operations, affecting various Ubuntu versions. Ubuntu users are strongly encouraged to update their FreeImage versions promptly to ensure the security and compliance of their systems.
Debian 11 and Debian 12 have already received these fixes, and Debian users are urged to upgrade their existing installations of freeimage packages. Additionally, TuxCare’s KernelCare Enterprise offers live patching services, automating the deployment of security patches for supported distributions, including Ubuntu and Debian.