|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-52355: tiff: libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Michael Vetter <mvetter> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | andrea.mattiazzo, mvetter, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/392198/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-52355:5.0:(AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-01-26 10:32:30 UTC
I would not go and backport this memory management framework currently. We could: - ignore the problem and ask people to fix it with ulimits - hardcode limits in the code, like 64k pixels width maximum or so. (In reply to Marcus Meissner from comment #5) > I would not go and backport this memory management framework currently. > > We could: > > - ignore the problem and ask people to fix it with ulimits I would tend to this option since the problem is only for developers who use the library, and we don't know what size of tiff files our customers might want to work with (if anybody even writes their own applications using tiff) or how much memory they have available. @Stoyan what would be the next steps in this case? I am closing it as won't fix. In case of questions we could provide the mitigation to use ulimits. |