Описание
ELSA-2025-19156: libtiff security update (IMPORTANT)
[4.6.0-6.1]
- Fix buffer underflow crash in TIFFReadRGBAImageOriented
- Resolves: RHEL-112522
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
libtiff
4.6.0-6.el10_0.1
libtiff-devel
4.6.0-6.el10_0.1
libtiff-tools
4.6.0-6.el10_0.1
Oracle Linux x86_64
libtiff
4.6.0-6.el10_0.1
libtiff-devel
4.6.0-6.el10_0.1
libtiff-tools
4.6.0-6.el10_0.1
Связанные CVE
Связанные уязвимости
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where ...