An out-of-memory problem was found in libtiff that could be triggered by passing a craft tiff file to TIFFRasterScanlineSize64() API. In this flaw a remote attackers could cause deny-of-services via a craft input (with size smaller than 379 KB). Reference: https://gitlab.com/libtiff/libtiff/-/issues/621 Fixed at: https://gitlab.com/libtiff/libtiff/-/merge_requests/553 https://gitlab.com/libtiff/libtiff/-/commit/6791bff9f76c2a7f2f18c80b95c796e93fae6a34
Created iv tracking bugs for this issue: Affects: fedora-all [bug 2251327] Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 2251329] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 2251330] Created tkimg tracking bugs for this issue: Affects: fedora-all [bug 2251328]