USN-4529-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4529-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4529-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4529-1
Related
Published
2020-09-22T12:42:37.985764Z
Modified
2020-09-22T12:42:37.985764Z
Summary
freeimage vulnerabilities
Details

It was discovered that FreeImage incorrectly handled certain memory operations. If a user were tricked into opening a crafted TIFF file, a remote attacker could use this issue to cause a heap buffer overflow, resulting in a denial of service attack. (CVE-2019-12211)

It was discovered that FreeImage incorrectly processed images under certain circumstances. If a user were tricked into opening a crafted TIFF file, a remote attacker could possibly use this issue to cause a stack exhaustion condition, resulting in a denial of service attack. (CVE-2019-12213)

References

Affected packages

Ubuntu:18.04:LTS / freeimage

Package

Name
freeimage
Purl
pkg:deb/ubuntu/freeimage@3.17.0+ds1-5+deb9u1build0.18.04.1?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.17.0+ds1-5+deb9u1build0.18.04.1

Affected versions

3.*

3.17.0+ds1-5build2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libfreeimage-dev": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimage3-dbg": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimage3": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimageplus3-dbg": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimageplus-dev": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimageplus3": "3.17.0+ds1-5+deb9u1build0.18.04.1",
            "libfreeimageplus-doc": "3.17.0+ds1-5+deb9u1build0.18.04.1"
        }
    ]
}