It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
{ "binaries": [ { "binary_name": "libtiff-doc", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff-opengl", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff-opengl-dbgsym", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff-tools", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff-tools-dbgsym", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff5", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff5-dbgsym", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiff5-dev", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiffxx5", "binary_version": "4.0.6-1ubuntu0.8+esm8" }, { "binary_name": "libtiffxx5-dbgsym", "binary_version": "4.0.6-1ubuntu0.8+esm8" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }