First published: Mon Aug 05 2024(Updated: )
A null pointer dereference issue was found in Libtiff's tif_dirinfo.c file. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or just injecting faults, which would cause segmentation fault. This may cause an application crash, eventually leading to a denial of service. References: <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/559">https://gitlab.com/libtiff/libtiff/-/merge_requests/559</a> <a href="https://gitlab.com/libtiff/libtiff/-/issues/624">https://gitlab.com/libtiff/libtiff/-/issues/624</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2302996 is considered high due to the potential for causing segmentation faults.
To fix REDHAT-BUG-2302996, update to the latest version of Libtiff that includes the patch for this issue.
The issue in REDHAT-BUG-2302996 is caused by a null pointer dereference in the tif_dirinfo.c file of Libtiff.
REDHAT-BUG-2302996 affects the Libtiff library widely used for handling TIFF image files.
The potential impacts of REDHAT-BUG-2302996 include application crashes and the possibility of memory allocation failures.