Updated freeimage packages fix security vulnerabilities
Publication date: 05 Jan 2020Modification date: 05 Jan 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-12211 , CVE-2019-12213
Description
The updated packages fix security vulnerabilities: When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow. (CVE-2019-12211) When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory function in PluginTIFF.cpp always returns 1, leading to stack exhaustion. (CVE-2019-12213)
References
- https://bugs.mageia.org/show_bug.cgi?id=25967
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/56P2TDRB2FEJEWDRIAOPGEDF7L2VNA7B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PUWVVP67FYM4GMWD7TPQ7C7JPPRUZHYE/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12213
SRPMS
7/core
- freeimage-3.18.0-2.mga7