An out-of-memory problem was found in libtiff that could be triggered by passing a craft tiff file to TIFFReadFromUserBuffer() API. In this flaw a remote attacker could could utilize this bug to perform arbitrary size allocation and cause deny-of-services. Reference: https://gitlab.com/libtiff/libtiff/-/issues/619 Fixed at: https://gitlab.com/libtiff/libtiff/-/merge_requests/553
Created iv tracking bugs for this issue: Affects: fedora-all [bug 2251323] Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 2251321] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 2251322] Created tkimg tracking bugs for this issue: Affects: fedora-all [bug 2251324]
*** This bug has been marked as a duplicate of bug 2251311 ***