First published: Fri Jul 12 2024(Updated: )
A flaw was found in the libtiff library. An out-of-memory issue in the TIFFReadEncodedStrip function can be triggered when processing a crafted tiff file, allowing attackers to perform memory allocation of arbitrary sizes, resulting in a denial of service. Reference: <a href="https://gitlab.com/libtiff/libtiff/-/issues/620">https://gitlab.com/libtiff/libtiff/-/issues/620</a> Upstream patch: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/553">https://gitlab.com/libtiff/libtiff/-/merge_requests/553</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2297636 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-2297636, update the libtiff library to the latest patched version.
REDHAT-BUG-2297636 can lead to denial of service by causing the application to crash when processing a specially crafted TIFF file.
The specific affected versions of libtiff are not detailed, but the flaw exists in the library's handling of TIFF files.
REDHAT-BUG-2297636 primarily affects systems that utilize the libtiff library on Red Hat environments.