libtiff.so is vulnerable to Denial Of Service (DoS). The vulnerability exists due to an out-of-bounds read causes by tiffcp in tiffcp.c
which allows an attacker to cause an application crash via a crafted tiff file.
github.com/advisories/GHSA-6fr2-gj2w-xgr6
gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
gitlab.com/libtiff/libtiff/-/issues/277
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
lists.fedoraproject.org/archives/list/[email protected]/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
lists.fedoraproject.org/archives/list/[email protected]/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
lists.fedoraproject.org/archives/list/[email protected]/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
security.netapp.com/advisory/ntap-20230331-0001/