Excessive resource consumption in golang.org/x/image/tiff
Description
The TIFF decoder does not place a limit on the size of compressed tile data. A maliciously-crafted image can exploit this to cause a small image (both in terms of pixel width/height, and encoded size) to make the decoder decode large amounts of compressed data, consuming excessive memory and CPU.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The TIFF decoder in affected software lacks a size limit on compressed tile data, enabling a Denial-of-Service via crafted small images.
Root
Cause
The vulnerability lies in the TIFF decoder, which does not impose a limit on the size of compressed tile data. A small image (in both pixel dimensions and encoded size) can contain a tile with an extremely large amount of compressed data. When the decoder attempts to process this tile, it decompresses the oversized data, leading to excessive memory consumption and CPU usage. This is a classic missing bounds check on compressed input streams. [1]
Exploitation
Vector
An attacker crafts a malicious TIFF image with small pixel width/height but with one or more tiles containing a large blob of compressed data. No special access or privileges are required beyond delivering the image to the target (e.g., via email, web upload, or direct file access). The decoder processes the image as usual, but the absence of a size limit causes it to allocate memory for and decompress the oversized tile data, consuming system resources proportional to the inflated data. [1]
Impact
Successful exploitation results in a Denial-of-Service (DoS) condition: the process running the decoder exhausts available memory and/or CPU, potentially crashing or becoming unresponsive. The impact is limited to availability; there is no indication of code execution or data exfiltration. The vulnerability can be triggered by a file that appears benign at first glance (small file size and dimensions). [1]
Mitigation
Status
As of the publication date (2023-08-02), a patch or workaround that introduces a maximum tile size check is required. The issue is tracked as CVE-2023-29408. Affected software distributors (e.g., Fedora) have released updates (referenced in package announcements [2], [3], [4]). Users should apply vendor patches or update to a fixed version of the TIFF library. No evidence of exploitation in the wild (KEV list) has been publicly documented at the time of writing.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
golang.org/x/imageGo | < 0.10.0 | 0.10.0 |
Affected products
7- ghsa-coords6 versionspkg:golang/golang.org/x/imagepkg:rpm/opensuse/keybase-client&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/keybase-client&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/keybase-client&distro=openSUSE%20Tumbleweedpkg:rpm/suse/keybase-client&distro=SUSE%20Package%20Hub%2015%20SP5pkg:rpm/suse/keybase-client&distro=SUSE%20Package%20Hub%2015%20SP6
< 0.10.0+ 5 more
- (no CPE)range: < 0.10.0
- (no CPE)range: < 6.2.8-bp156.2.3.1
- (no CPE)range: < 6.2.8-bp156.2.3.1
- (no CPE)range: < 6.2.2-2.1
- (no CPE)range: < 6.2.8-bp156.2.3.1
- (no CPE)range: < 6.2.8-bp156.2.3.1
- golang.org/x/image/golang.org/x/image/tiffv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- github.com/advisories/GHSA-x92r-3vfx-4cv3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-29408ghsaADVISORY
- go.dev/cl/514897ghsaWEB
- go.dev/issue/61582ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESKghsaWEB
- pkg.go.dev/vuln/GO-2023-1989ghsaWEB
- security.netapp.com/advisory/ntap-20230831-0009ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/mitre
- security.netapp.com/advisory/ntap-20230831-0009/mitre
News mentions
0No linked articles in our index yet.