A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used. https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff https://gitlab.com/libtiff/libtiff/-/issues/402 https://vuldb.com/?id.196363
Created iv tracking bugs for this issue: Affects: fedora-all [bug 2072616] Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 2072615] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 2072617]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-1210