OESA-2026-1442

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1442
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1442.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1442
Upstream
Published
2026-02-28T12:44:23Z
Modified
2026-02-28T13:02:45.327717Z
Summary
libtiff security update
Details

This provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. The latest version of the TIFF specification is available on-line in several different formats.And contains command-line programs for manipulating TIFF format image files using the libtiff library.

Security Fix(es):

A NULL pointer dereference vulnerability (CWE-476) exists in the component libtiff/tif_open.c of libtiff up to version 4.7.1. When the application dereferences a pointer that it expects to be valid but is actually NULL, it can cause a crash or exit, affecting service availability.(CVE-2025-61143)

A critical vulnerability was found in libtiff up to version 4.7.1 (Image Processing Software). The issue is classified as CWE-121 Stack-based Buffer Overflow. A stack-based buffer overflow condition occurs when the buffer being overwritten is allocated on the stack (i.e., is a local variable or function parameter). This vulnerability impacts confidentiality, integrity, and availability.(CVE-2025-61144)

libtiff is a library for reading and writing TIFF (Tagged Image File Format) files. A double free vulnerability (CWE-415) exists in the tools/tiffcrop.c component of libtiff versions up to and including 4.7.1. The vulnerability stems from the program calling the free() function twice on the same memory address. An attacker could potentially exploit this to modify unexpected memory locations, impacting the confidentiality, integrity, and availability of the system, potentially leading to application crashes or arbitrary code execution.(CVE-2025-61145)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP4 / libtiff

Package

Name
libtiff
Purl
pkg:rpm/openEuler/libtiff&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.0-48.oe2203sp4

Ecosystem specific

{
    "src": [
        "libtiff-4.3.0-48.oe2203sp4.src.rpm"
    ],
    "aarch64": [
        "libtiff-4.3.0-48.oe2203sp4.aarch64.rpm",
        "libtiff-debuginfo-4.3.0-48.oe2203sp4.aarch64.rpm",
        "libtiff-debugsource-4.3.0-48.oe2203sp4.aarch64.rpm",
        "libtiff-devel-4.3.0-48.oe2203sp4.aarch64.rpm",
        "libtiff-static-4.3.0-48.oe2203sp4.aarch64.rpm",
        "libtiff-tools-4.3.0-48.oe2203sp4.aarch64.rpm"
    ],
    "noarch": [
        "libtiff-help-4.3.0-48.oe2203sp4.noarch.rpm"
    ],
    "x86_64": [
        "libtiff-4.3.0-48.oe2203sp4.x86_64.rpm",
        "libtiff-debuginfo-4.3.0-48.oe2203sp4.x86_64.rpm",
        "libtiff-debugsource-4.3.0-48.oe2203sp4.x86_64.rpm",
        "libtiff-devel-4.3.0-48.oe2203sp4.x86_64.rpm",
        "libtiff-static-4.3.0-48.oe2203sp4.x86_64.rpm",
        "libtiff-tools-4.3.0-48.oe2203sp4.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1442.json"