First published: Tue Jan 16 2024(Updated: )
It was discovered that FreeImage incorrectly handled certain memory operations. If a user were tricked into opening a crafted TIFF file, a remote attacker could use this issue to cause a heap buffer overflow, resulting in a denial of service attack. This issue only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211) It was discovered that FreeImage incorrectly processed images under certain circumstances. If a user were tricked into opening a crafted TIFF file, a remote attacker could possibly use this issue to cause a stack exhaustion condition, resulting in a denial of service attack. This issue only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213) It was discovered that FreeImage incorrectly processed certain images. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2020-21427, CVE-2020-21428) It was discovered that FreeImage incorrectly processed certain images. If a user or automated system were tricked into opening a specially crafted PFM file, an attacker could possibly use this issue to cause a denial of service. (CVE-2020-22524)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libfreeimage3 | <3.18.0+ds2-9.1ubuntu0.1 | 3.18.0+ds2-9.1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.18.0+ds2-9.1ubuntu0.1 | 3.18.0+ds2-9.1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libfreeimage3 | <3.18.0+ds2-9ubuntu0.1 | 3.18.0+ds2-9ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.18.0+ds2-9ubuntu0.1 | 3.18.0+ds2-9ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libfreeimage3 | <3.18.0+ds2-6ubuntu5.1 | 3.18.0+ds2-6ubuntu5.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.18.0+ds2-6ubuntu5.1 | 3.18.0+ds2-6ubuntu5.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libfreeimage3 | <3.18.0+ds2-1ubuntu3.1 | 3.18.0+ds2-1ubuntu3.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.18.0+ds2-1ubuntu3.1 | 3.18.0+ds2-1ubuntu3.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libfreeimage3 | <3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 | 3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 | 3.17.0+ds1-5+deb9u1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libfreeimage3 | <3.17.0+ds1-2ubuntu0.1+esm1 | 3.17.0+ds1-2ubuntu0.1+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libfreeimageplus3 | <3.17.0+ds1-2ubuntu0.1+esm1 | 3.17.0+ds1-2ubuntu0.1+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libfreeimage3 | <3.15.4-3ubuntu0.1+esm3 | 3.15.4-3ubuntu0.1+esm3 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6586-1 is classified as high due to the potential for a heap buffer overflow leading to a denial of service.
To fix USN-6586-1, upgrade the affected packages libfreeimage3 and libfreeimageplus3 to their fixed versions as specified in the advisory.
USN-6586-1 affects multiple Ubuntu versions including 14.04, 16.04, 18.04, 20.04, 22.04, and 23.04.
The specific packages impacted by USN-6586-1 are libfreeimage3 and libfreeimageplus3.
While USN-6586-1 primarily leads to denial of service, it can potentially be manipulated for other attacks due to memory vulnerabilities.