Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:20034

Опубликовано: 11 нояб. 2025
Источник: rocky
Оценка: Important

Описание

Important: libtiff security update

The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

  • libtiff: LibTIFF Use-After-Free Vulnerability (CVE-2025-8176)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libtiffi68636.el8_10libtiff-4.0.9-36.el8_10.i686.rpm
libtiffx86_6436.el8_10libtiff-4.0.9-36.el8_10.x86_64.rpm
libtiff-develi68636.el8_10libtiff-devel-4.0.9-36.el8_10.i686.rpm
libtiff-develx86_6436.el8_10libtiff-devel-4.0.9-36.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 5.3
ubuntu
4 месяца назад

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
redhat
4 месяца назад

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
nvd
4 месяца назад

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
msrc
3 месяца назад

LibTIFF tiffmedian.c get_histogram use after free

CVSS3: 5.3
debian
4 месяца назад

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared ...