In FreeImage library version 3.19.0 [r1909], when reading images in XPM format, the Load() function has a stack overflow write vulnerability, which may lead to a command execution.
The aim of this ticket is to forward upstream the vulnerabilities published at
https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909.
Please see there for more details.
This is probably a duplicate of #355 (it is currently private, and I don't have access to it)