CVE-2019-12214

NameCVE-2019-12214
DescriptionIn FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs947478

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeimage (PTS)jessie, jessie (lts)3.15.4-4.2+deb8u2vulnerable
stretch (security)3.17.0+ds1-5+deb9u1vulnerable
stretch (lts), stretch3.17.0+ds1-5+deb9u2vulnerable
buster (security), buster, buster (lts)3.18.0+ds2-1+deb10u2vulnerable
bullseye (security), bullseye3.18.0+ds2-6+deb11u1vulnerable
bookworm (security), bookworm3.18.0+ds2-9+deb12u1vulnerable
sid, trixie3.18.0+ds2-10vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeimagesourcewheezy(unfixed)end-of-life
freeimagesource(unstable)(unfixed)947478

Notes

[bookworm] - freeimage <postponed> (Revisit when upstream fixes are available)
[bullseye] - freeimage <postponed> (Revisit when upstream fixes are available)
[buster] - freeimage <postponed> (Revisit when upstream fixes are available)
[stretch] - freeimage <postponed> (Revisit when upstream fixes are available)
[jessie] - freeimage <postponed> (Revisit when upstream fixes are available)
https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
very few information regarding this vulnerability, which is seemingly located
in libopenjpeg, not freeimage. Without reproducer or stacktrace, this is
nearly unfixable.

Search for package or bug name: Reporting problems