Name | CVE-2025-8176 |
Description | A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tiff (PTS) | bullseye | 4.2.0-1+deb11u5 | vulnerable |
| bullseye (security) | 4.2.0-1+deb11u6 | vulnerable |
| bookworm | 4.5.0-6+deb12u2 | vulnerable |
| bookworm (security) | 4.5.0-6+deb12u1 | vulnerable |
| trixie | 4.7.0-3 | vulnerable |
| forky, sid | 4.7.0-4 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tiff | source | (unstable) | (unfixed) | unimportant | | |
Notes
https://gitlab.com/libtiff/libtiff/-/issues/707
https://gitlab.com/libtiff/libtiff/-/merge_requests/727
Crash in CLI tool, no security impact