CVE-2019-12211

NameCVE-2019-12211
DescriptionWhen FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2031-1, DSA-4593-1
NVD severitymedium
Debian Bugs929597

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeimage (PTS)jessie3.15.4-4.2+deb8u1vulnerable
jessie (security)3.15.4-4.2+deb8u2fixed
stretch, stretch (security)3.17.0+ds1-5+deb9u1fixed
buster, buster (security)3.18.0+ds2-1+deb10u1fixed
bullseye, sid3.18.0+ds2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeimagesource(unstable)3.18.0+ds2-3929597
freeimagesourcebuster3.18.0+ds2-1+deb10u1DSA-4593-1
freeimagesourcejessie3.15.4-4.2+deb8u2DLA-2031-1
freeimagesourcestretch3.17.0+ds1-5+deb9u1DSA-4593-1

Notes

[buster] - freeimage <postponed> (Revisit when upstream fixes are available)
[stretch] - freeimage <postponed> (Revisit when upstream fixes are available)
https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
https://sourceforge.net/p/freeimage/svn/1825/

Search for package or bug name: Reporting problems