A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2251344
https://support.apple.com/kb/HT214124
https://support.apple.com/kb/HT214123
https://support.apple.com/kb/HT214122
https://support.apple.com/kb/HT214120
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214117
https://support.apple.com/kb/HT214116
https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
https://gitlab.com/libtiff/libtiff/-/merge_requests/546
https://gitlab.com/libtiff/libtiff/-/issues/622
http://seclists.org/fulldisclosure/2024/Jul/23
http://seclists.org/fulldisclosure/2024/Jul/22
http://seclists.org/fulldisclosure/2024/Jul/21
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/18