libtiff-4.4.0-13.el9_6.2
エラータID: AXSA:2025-11001:05
リリース日:
2025/10/29 Wednesday - 11:07
題名:
libtiff-4.4.0-13.el9_6.2
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- libtiff には、メモリ領域の解放後利用の問題があるため、ローカル
の攻撃者により、情報の漏洩、データ破壊、およびサービス拒否攻撃を
可能とする脆弱性が存在します。(CVE-2025-8176)
- compat-libtiff3 および mingw-libtiff には、カラー情報のデータ
を任意のメモリ領域に上書きできてしまう問題があるため、リモートの
攻撃者により、巨大な高さのサイズを持つように巧妙に細工されたメタ
データ情報を持つ LIFF 形式のファイルの処理を介して、任意のコード
の実行、およびサービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2025-9900)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-8176
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
追加情報:
N/A
ダウンロード:
SRPMS
- libtiff-4.4.0-13.el9_6.2.src.rpm
MD5: f9f8c9aa5580cf55bc37b26dff1eb44c
SHA-256: 9dac3927a7b6930db233fb2e86d9084046b3cd156b1b912a7335d9d5a98972a8
Size: 2.76 MB
Asianux Server 9 for x86_64
- libtiff-4.4.0-13.el9_6.2.i686.rpm
MD5: 15b284afe0c065af6ec81a53be972c92
SHA-256: f7e4a1e68dc54376d622dc8fc9d45528511dba8252675ddbedaa79d213105677
Size: 213.66 kB - libtiff-4.4.0-13.el9_6.2.x86_64.rpm
MD5: c94e5e524958a5d752b01f49f2ccde45
SHA-256: 9f194ac0a6a1dc9bbf26e6e081b4c115c63990984cf72d34ec0c1512f3fa7240
Size: 196.02 kB - libtiff-devel-4.4.0-13.el9_6.2.i686.rpm
MD5: 9f2e02c6c007b278345d1424067b9d0c
SHA-256: 511a077d3deabb063605e5c37ba1898a6512139cb587f6aacf96ea39f07a0c16
Size: 557.44 kB - libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpm
MD5: 967ac8e2bdc64cdfb745a2c0c5325c15
SHA-256: 20a4b96b597394bc2f0e9d7e87b3097e25da9606433e39df456c9c352547a9e6
Size: 557.48 kB - libtiff-tools-4.4.0-13.el9_6.2.x86_64.rpm
MD5: fd1cb32afbf6e86b0acda62296bf468d
SHA-256: ce84d5cd124259d0bf98234759142659430e28fd2d5671967d0b448d8f7a814c
Size: 246.98 kB