vulnerability
Oracle Linux: CVE-2025-8176: ELSA-2025-19113: libtiff security update (IMPORTANT) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:S/C:P/I:P/A:P) | Jul 26, 2025 | Oct 29, 2025 | Nov 12, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Published
Jul 26, 2025
Added
Oct 29, 2025
Modified
Nov 12, 2025
Description
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.
A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service.
Solutions
oracle-linux-upgrade-libtifforacle-linux-upgrade-libtiff-develoracle-linux-upgrade-libtiff-toolsoracle-linux-upgrade-mingw32-libtifforacle-linux-upgrade-mingw32-libtiff-staticoracle-linux-upgrade-mingw64-libtifforacle-linux-upgrade-mingw64-libtiff-static
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.