Untriaged
Libtiff: tiffrasterscanlinesize64 produce too-big size and could cause oom
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Affected products
iv
tkimg
libtiff
- <4.6.0
- *
mingw-libtiff
compat-libtiff3
rhaiis/vllm-cuda-rhel9
- *
rhaiis/vllm-rocm-rhel9
- *
rhaiis/model-opt-cuda-rhel9
- *
discovery/discovery-ui-rhel9
- *
Package maintainers
-
@l0b0 Victor Engmark <victor@engmark.name>
-
@willcohen Will Cohen
-
@autra Augustin Trancart <augustin.trancart@gmail.com>
-
@nh2 Niklas Hambüchen <mail@nh2.me>
-
@imincik Ivan Mincik <ivan.mincik@gmail.com>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com>