Search for packages
| purl | pkg:rpm/redhat/libtiff@4.6.0-6.el10_1?arch=2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ua38-ur2u-eues
Aliases: CVE-2023-52356 |
Out-of-bounds Write A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-19T06:26:22.205461+00:00 | RedHat Importer | Affected by | VCID-ua38-ur2u-eues | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json | 38.4.0 |
| 2026-04-10T08:23:20.320511+00:00 | RedHat Importer | Affected by | VCID-ua38-ur2u-eues | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52356.json | 38.1.0 |