CVE-2019-12211

NameCVE-2019-12211
DescriptionWhen FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2031-1, DSA-4593-1
Debian Bugs929597

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeimage (PTS)jessie, jessie (lts)3.15.4-4.2+deb8u2fixed
stretch (security)3.17.0+ds1-5+deb9u1fixed
stretch (lts), stretch3.17.0+ds1-5+deb9u2fixed
buster3.18.0+ds2-1+deb10u1fixed
buster (security)3.18.0+ds2-1+deb10u2fixed
bullseye (security), bullseye3.18.0+ds2-6+deb11u1fixed
bookworm (security), bookworm3.18.0+ds2-9+deb12u1fixed
sid, trixie3.18.0+ds2-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeimagesourcewheezy(unfixed)end-of-life
freeimagesourcejessie3.15.4-4.2+deb8u2DLA-2031-1
freeimagesourcestretch3.17.0+ds1-5+deb9u1DSA-4593-1
freeimagesourcebuster3.18.0+ds2-1+deb10u1DSA-4593-1
freeimagesource(unstable)3.18.0+ds2-3929597

Notes

[buster] - freeimage <postponed> (Revisit when upstream fixes are available)
[stretch] - freeimage <postponed> (Revisit when upstream fixes are available)
https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
https://sourceforge.net/p/freeimage/svn/1825/

Search for package or bug name: Reporting problems