USN-4529-1: FreeImage vulnerabilities
22 September 2020
Several security issues were fixed in FreeImage.
Releases
Packages
- freeimage - Support library for graphics image formats
Details
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. (CVE-2019-12211)
It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack.
(CVE-2019-12213)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libfreeimage-dev
-
3.17.0+ds1-5+deb9u1build0.18.04.1
-
libfreeimage3
-
3.17.0+ds1-5+deb9u1build0.18.04.1
-
libfreeimageplus-dev
-
3.17.0+ds1-5+deb9u1build0.18.04.1
-
libfreeimageplus3
-
3.17.0+ds1-5+deb9u1build0.18.04.1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6586-1: libfreeimageplus3, libfreeimage3, libfreeimageplus-dev, libfreeimage-dev, freeimage, libfreeimageplus-doc