In libtiff 4.1.0, an integer overflow vulnerability exists in tif_getimage.c file. By enticing a user to open a craft TIFF file, an attacker may leverage the vulnerability to inject and execute arbitrary code. References: https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2 https://gitlab.com/libtiff/libtiff/-/merge_requests/160
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1932043] Created mingw-libtiff tracking bugs for this issue: Affects: fedora-all [bug 1932042]
External References: https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2 https://gitlab.com/libtiff/libtiff/-/merge_requests/160
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4241 https://access.redhat.com/errata/RHSA-2021:4241
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-35523