Packages
- freeimage - Support library for graphics image formats
Details
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)
It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)
It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote...
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)
It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)
It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2020-21427,
CVE-2020-21428)
It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted PFM file, an attacker could possibly use this issue to cause a
denial of service. (CVE-2020-22524)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
23.10 mantic | libfreeimage3 – 3.18.0+ds2-9.1ubuntu0.1 | ||
libfreeimageplus3 – 3.18.0+ds2-9.1ubuntu0.1 | |||
23.04 lunar | libfreeimage3 – 3.18.0+ds2-9ubuntu0.1 | ||
libfreeimageplus3 – 3.18.0+ds2-9ubuntu0.1 | |||
22.04 jammy | libfreeimage3 – 3.18.0+ds2-6ubuntu5.1 | ||
libfreeimageplus3 – 3.18.0+ds2-6ubuntu5.1 | |||
20.04 focal | libfreeimage3 – 3.18.0+ds2-1ubuntu3.1 | ||
libfreeimageplus3 – 3.18.0+ds2-1ubuntu3.1 | |||
18.04 bionic | libfreeimage3 – 3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 | ||
libfreeimageplus3 – 3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 | |||
16.04 xenial | libfreeimage3 – 3.17.0+ds1-2ubuntu0.1+esm1 | ||
libfreeimageplus3 – 3.17.0+ds1-2ubuntu0.1+esm1 | |||
14.04 trusty | libfreeimage3 – 3.15.4-3ubuntu0.1+esm3 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.