First published: Fri Feb 17 2023(Updated: )
An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Image | <0.5.0 | |
Golang Tiff | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
go/golang.org/x/image | <0.5.0 | 0.5.0 |
<0.5.0 | ||
=37 | ||
=38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-41727 is medium, with a severity value of 5.5.
An attacker can exploit CVE-2022-41727 by crafting a malformed TIFF image that consumes a significant amount of memory when passed to DecodeConfig, leading to a denial of service.
The following software packages are affected by CVE-2022-41727: golang.org/x/image (version up to 0.5.0), Golang Image, and Golang Tiff.
Yes, a fix for CVE-2022-41727 is available in version 0.5.0 of golang.org/x/image.
Yes, the following references provide more information on CVE-2022-41727: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-41727), [Go.dev CL](https://go.dev/cl/468195), [Go.dev issue](https://go.dev/issue/58003).