tifread.c in LibTIFF 4.0.7 does not ensure that tifrawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libtiff-doc": "4.0.3-7ubuntu0.8", "libtiff5-dbgsym": "4.0.3-7ubuntu0.8", "libtiff-opengl": "4.0.3-7ubuntu0.8", "libtiffxx5-dbgsym": "4.0.3-7ubuntu0.8", "libtiff4-dev": "4.0.3-7ubuntu0.8", "libtiff-opengl-dbgsym": "4.0.3-7ubuntu0.8", "libtiff-tools-dbgsym": "4.0.3-7ubuntu0.8", "libtiff5": "4.0.3-7ubuntu0.8", "libtiff5-alt-dev": "4.0.3-7ubuntu0.8", "libtiff-tools": "4.0.3-7ubuntu0.8", "libtiffxx5": "4.0.3-7ubuntu0.8", "libtiff5-dev": "4.0.3-7ubuntu0.8" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libtiff-doc": "4.0.6-1ubuntu0.3", "libtiff5-dbgsym": "4.0.6-1ubuntu0.3", "libtiff-opengl": "4.0.6-1ubuntu0.3", "libtiffxx5-dbgsym": "4.0.6-1ubuntu0.3", "libtiff-opengl-dbgsym": "4.0.6-1ubuntu0.3", "libtiff-tools-dbgsym": "4.0.6-1ubuntu0.3", "libtiff5": "4.0.6-1ubuntu0.3", "libtiff-tools": "4.0.6-1ubuntu0.3", "libtiffxx5": "4.0.6-1ubuntu0.3", "libtiff5-dev": "4.0.6-1ubuntu0.3" } ] }