An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
access.redhat.com/security/cve/CVE-2023-6277
bugzilla.redhat.com/show_bug.cgi?id=2251311
gitlab.com/libtiff/libtiff/-/issues/614
gitlab.com/libtiff/libtiff/-/merge_requests/545
lists.fedoraproject.org/archives/list/[email protected]/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
lists.fedoraproject.org/archives/list/[email protected]/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
security.netapp.com/advisory/ntap-20240119-0002/