A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Libtiff | Libtiff | - (including) | - (including) |
| Red Hat Enterprise Linux 8 | RedHat | libtiff-0:4.0.9-32.el8_10 | * |
| Red Hat Enterprise Linux 9 | RedHat | libtiff-0:4.4.0-15.el9 | * |
| Red Hat Discovery 2 | RedHat | discovery/discovery-ui-rhel9:sha256:69cb9c84b806ee2f448bdbbcf3174855432f5caec8f31ca2a345655da4a72f57 | * |
| Gdal | Ubuntu | trusty | * |
| Gdal | Ubuntu | trusty/esm | * |
| Gdal | Ubuntu | xenial | * |
| Qtwebengine-opensource-src | Ubuntu | bionic | * |
| Qtwebengine-opensource-src | Ubuntu | focal | * |
| Qtwebengine-opensource-src | Ubuntu | mantic | * |
| Qtwebengine-opensource-src | Ubuntu | oracular | * |
| Texmaker | Ubuntu | bionic | * |
| Texmaker | Ubuntu | focal | * |
| Texmaker | Ubuntu | mantic | * |
| Texmaker | Ubuntu | oracular | * |
| Tiff | Ubuntu | bionic | * |
| Tiff | Ubuntu | devel | * |
| Tiff | Ubuntu | esm-infra-legacy/trusty | * |
| Tiff | Ubuntu | esm-infra/bionic | * |
| Tiff | Ubuntu | esm-infra/focal | * |
| Tiff | Ubuntu | esm-infra/xenial | * |
| Tiff | Ubuntu | focal | * |
| Tiff | Ubuntu | jammy | * |
| Tiff | Ubuntu | mantic | * |
| Tiff | Ubuntu | noble | * |
| Tiff | Ubuntu | oracular | * |
| Tiff | Ubuntu | plucky | * |
| Tiff | Ubuntu | questing | * |
| Tiff | Ubuntu | trusty | * |
| Tiff | Ubuntu | trusty/esm | * |
| Tiff | Ubuntu | xenial | * |