Bug 1213967 (CVE-2023-29407) - VUL-0: TRACKERBUG: CVE-2023-29407: golang.org/x/image/tiff: excessive CPU consumption in decoding
Summary: VUL-0: TRACKERBUG: CVE-2023-29407: golang.org/x/image/tiff: excessive CPU con...
Status: RESOLVED INVALID
Alias: CVE-2023-29407
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/374015/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-04 03:56 UTC by Stoyan Manolov
Modified: 2023-08-04 13:19 UTC (History)
6 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stoyan Manolov 2023-08-04 03:56:02 UTC
CVE-2023-29407

A maliciously-crafted image can cause excessive CPU consumption in decoding. A
tiled image with a height of 0 and a very large width can cause excessive CPU
consumption, despite the image size (width * height) appearing to be zero.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29407
https://bugzilla.redhat.com/show_bug.cgi?id=2228735
https://www.cve.org/CVERecord?id=CVE-2023-29407
https://go.dev/cl/514897
https://go.dev/issue/61581
https://pkg.go.dev/vuln/GO-2023-1990
Comment 1 Bruno Pitrus 2023-08-04 06:43:55 UTC
I checked the debugsource package and this code is not shipped in app-builder (probably removed during linking as dead code). Removing myself from the cc list.