USN-6586-1: FreeImage vulnerabilities

Publication date

16 January 2024

Overview

Several security issues were fixed in FreeImage.


Packages

  • freeimage - Support library for graphics image formats

Details

It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)

It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote...

It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)

It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2020-21427,
CVE-2020-21428)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted PFM file, an attacker could possibly use this issue to cause a
denial of service. (CVE-2020-22524)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
23.10 mantic libfreeimage3 –  3.18.0+ds2-9.1ubuntu0.1
libfreeimageplus3 –  3.18.0+ds2-9.1ubuntu0.1
23.04 lunar libfreeimage3 –  3.18.0+ds2-9ubuntu0.1
libfreeimageplus3 –  3.18.0+ds2-9ubuntu0.1
22.04 jammy libfreeimage3 –  3.18.0+ds2-6ubuntu5.1
libfreeimageplus3 –  3.18.0+ds2-6ubuntu5.1
20.04 focal libfreeimage3 –  3.18.0+ds2-1ubuntu3.1
libfreeimageplus3 –  3.18.0+ds2-1ubuntu3.1
18.04 bionic libfreeimage3 –  3.17.0+ds1-5+deb9u1ubuntu0.1~esm1  
libfreeimageplus3 –  3.17.0+ds1-5+deb9u1ubuntu0.1~esm1  
16.04 xenial libfreeimage3 –  3.17.0+ds1-2ubuntu0.1+esm1  
libfreeimageplus3 –  3.17.0+ds1-2ubuntu0.1+esm1  
14.04 trusty libfreeimage3 –  3.15.4-3ubuntu0.1+esm3  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›