USN-4529-1: FreeImage vulnerabilities
Publication date
22 September 2020
Overview
Several security issues were fixed in FreeImage.
Releases
Packages
- freeimage - Support library for graphics image formats
Details
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. (CVE-2019-12211)
It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack.
(CVE-2019-12213)
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. (CVE-2019-12211)
It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack.
(CVE-2019-12213)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
18.04 bionic | libfreeimage-dev – 3.17.0+ds1-5+deb9u1build0.18.04.1 | ||
libfreeimage3 – 3.17.0+ds1-5+deb9u1build0.18.04.1 | |||
libfreeimageplus-dev – 3.17.0+ds1-5+deb9u1build0.18.04.1 | |||
libfreeimageplus3 – 3.17.0+ds1-5+deb9u1build0.18.04.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.