vulnerability
Oracle Linux: CVE-2025-8177: ELSA-2025-21407: libtiff security update (IMPORTANT)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:S/C:P/I:P/A:P) | Jul 26, 2025 | Dec 3, 2025 | Dec 3, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Published
Jul 26, 2025
Added
Dec 3, 2025
Modified
Dec 3, 2025
Description
A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
A flaw was found in libtiff. The `setrow` function in `file tools/thumbnail.c` contains a buffer overflow vulnerability triggered by manipulation of image data, which can allow a local attacker to cause a denial of service. This overflow occurs when processing a crafted file. The vulnerability stems from insufficient bounds checking during row data assignment.
A flaw was found in libtiff. The `setrow` function in `file tools/thumbnail.c` contains a buffer overflow vulnerability triggered by manipulation of image data, which can allow a local attacker to cause a denial of service. This overflow occurs when processing a crafted file. The vulnerability stems from insufficient bounds checking during row data assignment.
Solutions
oracle-linux-upgrade-libtifforacle-linux-upgrade-libtiff-develoracle-linux-upgrade-libtiff-staticoracle-linux-upgrade-libtiff-tools
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.