{"id":"MGASA-2025-0252","summary":"Updated libtiff packages fix security vulnerabilities","details":"LibTIFF fax2ps tiff2pdf.c t2p_read_tiff_init null pointer dereference.\n(CVE-2024-13978)\nLibTIFF tiffmedian.c get_histogram use after free. (CVE-2025-8176)\nLibTIFF thumbnail.c setrow buffer overflow. (CVE-2025-8177)\nlibtiff tiff2ps tiff2ps.c PS_Lvl2page null pointer dereference.\n(CVE-2025-8534)\nLibTIFF tiffcrop tiffcrop.c main memory corruption. (CVE-2025-8961)\nLibTIFF tiffcmp tiffcmp.c InitCCITTFax3 memory leak. (CVE-2025-9165)\nLibtiff: libtiff write-what-where. (CVE-2025-9900)\n","modified":"2026-02-04T02:57:50.986549Z","published":"2025-10-31T20:04:14Z","related":["CVE-2024-13978","CVE-2025-8176","CVE-2025-8177","CVE-2025-8534","CVE-2025-8961","CVE-2025-9165","CVE-2025-9900"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2025-0252.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=34704"},{"type":"REPORT","url":"https://lists.debian.org/debian-security-announce/2025/msg00189.html"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/libtiff?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.5.1-1.6.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0252.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}