Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-35521

Publication date 9 March 2021

Last updated 24 July 2024


Ubuntu priority

Negligible

Why this priority?

Cvss 3 Severity Score

5.5 · Medium

Score breakdown

A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
tiff 22.04 LTS jammy
Not affected
21.10 impish
Not affected
21.04 hirsute
Not affected
20.10 groovy Ignored end of life
20.04 LTS focal
Fixed 4.1.0+git191117-2ubuntu0.20.04.3
18.04 LTS bionic
Fixed 4.0.9-5ubuntu0.5
16.04 LTS xenial
14.04 LTS trusty

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

Notes


ccdm94

various sources, including upstream, seem to indicate that the patch for this issue is the same as the patch for CVE-2020-35522. No patches addressing CVE-2020-35521 specifically were found, and the upstream changelog indicates that commit b5a935d96b is fixing more than one issue, both being most likely closely related. No reproducers or stack traces involving this vulnerability were found, and the issue links (207 and 209) seem to not exist anymore. Therefore, releases that have been patched for CVE-2020-35522 will be considered to have been patched for CVE-2020-35521 as well, as the only sources of information indicate that the patch for both issues is the same.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
tiff

Severity score breakdown

Parameter Value
Base score 5.5 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H