| "dataType": "CVE_RECORD", |
| "cveId": "CVE-2022-41727" |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| "value": "An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service." |
| "vendor": "golang.org/x/image", |
| "product": "golang.org/x/image/tiff", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "golang.org/x/image/tiff", |
| "name": "decoder.ifdUint" |
| "defaultStatus": "unaffected" |
| "description": "CWE-400: Uncontrolled Resource Consumption" |
| "url": "https://go.dev/issue/58003" |
| "url": "https://go.dev/cl/468195" |
| "url": "https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o" |
| "url": "https://pkg.go.dev/vuln/GO-2023-1572" |
| "value": "Philippe Antoine (Catena cyber) and OSS Fuzz" |