It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtiff-dev", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff-doc", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff-opengl", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff-opengl-dbgsym", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff-tools", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff-tools-dbgsym", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff5", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff5-dbgsym", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiff5-dev", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiffxx5", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" }, { "binary_name": "libtiffxx5-dbgsym", "binary_version": "4.1.0+git191117-2ubuntu0.20.04.2" } ] }