A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.Referenceshttps://access.redhat.com/errata/RHSA-2024:5079https://access.redhat.com/errata/RHSA-2025:20801https://access.redhat.com/errata/RHSA-2025:21994https://access.redhat.com/errata/RHSA-2025:23078https://access.redhat.com/errata/RHSA-2025:23079https://access.redhat.com/errata/RHSA-2025:23080https://access.redhat.com/errata/RHSA-2026:3461https://access.redhat.com/errata/RHSA-2026:3462https://access.redhat.com/errata/RHSA-2026:5958https://access.redhat.com/errata/RHSA-2026:7081https://access.redhat.com/errata/RHSA-2026:7304https://access.redhat.com/errata/RHSA-2026:7335https://access.redhat.com/errata/RHSA-2026:8747https://access.redhat.com/security/cve/CVE-2023-52356https://bugzilla.redhat.com/show_bug.cgi?id=2251344https://gitlab.com/libtiff/libtiff/-/issues/622https://gitlab.com/libtiff/libtiff/-/merge_requests/546