CVE-2026-4775

NameCVE-2026-4775
DescriptionA flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6203-1
Debian Bugs1132632

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tiff (PTS)bullseye4.2.0-1+deb11u5vulnerable
bullseye (security)4.2.0-1+deb11u7vulnerable
bookworm4.5.0-6+deb12u3vulnerable
bookworm (security)4.5.0-6+deb12u4fixed
trixie4.7.0-3+deb13u1vulnerable
trixie (security)4.7.0-3+deb13u2fixed
forky, sid4.7.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tiffsourcebookworm4.5.0-6+deb12u4DSA-6203-1
tiffsourcetrixie4.7.0-3+deb13u2DSA-6203-1
tiffsource(unstable)4.7.1-21132632

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2450768
https://gitlab.com/libtiff/libtiff/-/work_items/807
https://gitlab.com/libtiff/libtiff/-/work_items/787
https://gitlab.com/libtiff/libtiff/-/commit/782a11d6b5b61c6dc21e714950a4af5bf89f023c

Search for package or bug name: Reporting problems