Mageia alert MGASA-2020-0019 (freeimage)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2020-0019: Updated freeimage packages fix security vulnerabilities | |
Date: | Sun, 5 Jan 2020 16:39:10 +0100 | |
Message-ID: | <20200105153910.A760F9F641@duvel.mageia.org> |
MGASA-2020-0019 - Updated freeimage packages fix security vulnerabilities Publication date: 05 Jan 2020 URL: https://advisories.mageia.org/MGASA-2020-0019.html Type: security Affected Mageia releases: 7 CVE: CVE-2019-12211, CVE-2019-12213 Description: The updated packages fix security vulnerabilities: When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow. (CVE-2019-12211) When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory function in PluginTIFF.cpp always returns 1, leading to stack exhaustion. (CVE-2019-12213) References: - https://bugs.mageia.org/show_bug.cgi?id=25967 - https://lists.fedoraproject.org/archives/list/package-ann... - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... SRPMS: - 7/core/freeimage-3.18.0-2.mga7