Bug 1212397 (CVE-2023-25434) - VUL-0: CVE-2023-25434: tiff: Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215
Summary: VUL-0: CVE-2023-25434: tiff: Buffer Overflow via extractContigSamplesBytes() ...
Status: RESOLVED INVALID
Alias: CVE-2023-25434
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Michael Vetter
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/369557/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-06-15 07:08 UTC by Thomas Leroy
Modified: 2023-06-15 07:09 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2023-06-15 07:08:20 UTC
CVE-2023-25434

libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes()
at /libtiff/tools/tiffcrop.c:3215.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25434
https://bugzilla.redhat.com/show_bug.cgi?id=2215209
https://www.cve.org/CVERecord?id=CVE-2023-25434
https://gitlab.com/libtiff/libtiff/-/issues/519
Comment 1 Thomas Leroy 2023-06-15 07:09:24 UTC
I can't reproduce the ASAN crash on all codestreams. Not affected