Mageia 2020-0019: freeimage security update
Summary
The updated packages fix security vulnerabilities:
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load
function of the PluginTIFF.cpp file, but a memcpy occurs in which the
destination address and the size of the copied data are not considered,
resulting in a heap overflow. (CVE-2019-12211)
When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory
function in PluginTIFF.cpp always returns 1, leading to stack exhaustion.
(CVE-2019-12213)
References
- https://bugs.mageia.org/show_bug.cgi?id=25967
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/56P2TDRB2FEJEWDRIAOPGEDF7L2VNA7B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PUWVVP67FYM4GMWD7TPQ7C7JPPRUZHYE/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12213
Resolution
MGASA-2020-0019 - Updated freeimage packages fix security vulnerabilities
SRPMS
- 7/core/freeimage-3.18.0-2.mga7