{
  "threat_severity" : "Important",
  "public_date" : "2025-07-26T03:32:08Z",
  "bugzilla" : {
    "description" : "libtiff: LibTIFF Use-After-Free Vulnerability",
    "id" : "2383598",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2383598"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-825",
  "details" : [ "A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.", "A flaw was found in libtiff. The `get_histogram` function in `file/tiffmedian.c` exhibits a use-after-free condition when processing a specially crafted file, allowing a local attacker to trigger memory corruption. This manipulation results in a use-after-free vulnerability, and can lead to a denial of service." ],
  "statement" : "This vulnerability has been rated Important because it involves a use-after-free flaw in the get_histogram function of LibTIFF’s tiffmedian tool. Successful exploitation may allow a local attacker to execute arbitrary code or cause a denial of service, leading to loss of confidentiality, integrity, and availability.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2025-11-17T00:00:00Z",
    "advisory" : "RHSA-2025:21407",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "libtiff-0:4.0.3-35.el7_9.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-11-10T00:00:00Z",
    "advisory" : "RHSA-2025:20034",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "libtiff-0:4.0.9-36.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-11-06T00:00:00Z",
    "advisory" : "RHSA-2025:19906",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::crb",
    "package" : "mingw-libtiff-0:4.0.9-3.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0078",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "spice-client-win-0:8.10-3.el8_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0077",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "spice-client-win-0:8.10-3.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0077",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "spice-client-win-0:8.10-3.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0076",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "spice-client-win-0:8.10-3.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0076",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "spice-client-win-0:8.10-3.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0076",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "spice-client-win-0:8.10-3.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0001",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "spice-client-win-0:8.10-3.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0001",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "spice-client-win-0:8.10-3.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-10-28T00:00:00Z",
    "advisory" : "RHSA-2025:19113",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libtiff-0:4.4.0-13.el9_6.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20956",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libtiff-0:4.4.0-15.el9_7.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2025-11-17T00:00:00Z",
    "advisory" : "RHSA-2025:21508",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "libtiff-0:4.4.0-8.el9_2.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-11-17T00:00:00Z",
    "advisory" : "RHSA-2025:21507",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "libtiff-0:4.4.0-12.el9_4.4"
  }, {
    "product_name" : "Red Hat AI Inference Server 3.2",
    "release_date" : "2025-12-10T00:00:00Z",
    "advisory" : "RHSA-2025:23078",
    "cpe" : "cpe:/a:redhat:ai_inference_server:3.2::el9",
    "package" : "rhaiis/vllm-cuda-rhel9:sha256:bddcf7ab6d576572b6d60822c313ffebcd9869e4fde93e32ac327821f93cf32b"
  }, {
    "product_name" : "Red Hat AI Inference Server 3.2",
    "release_date" : "2025-12-10T00:00:00Z",
    "advisory" : "RHSA-2025:23079",
    "cpe" : "cpe:/a:redhat:ai_inference_server:3.2::el9",
    "package" : "rhaiis/vllm-rocm-rhel9:sha256:7856bdb7ae0d643a7b9362c164d4d4fe3c0c7186f5fff73a7ae9835b3df52e57"
  }, {
    "product_name" : "Red Hat AI Inference Server 3.2",
    "release_date" : "2025-12-10T00:00:00Z",
    "advisory" : "RHSA-2025:23080",
    "cpe" : "cpe:/a:redhat:ai_inference_server:3.2::el9",
    "package" : "rhaiis/model-opt-cuda-rhel9:sha256:14e32e88f1b89f59ed34a6d712746b82a6a54c6ed4727784f18aeff853abbdc7"
  }, {
    "product_name" : "Red Hat AI Inference Server 3.2",
    "release_date" : "2026-02-27T00:00:00Z",
    "advisory" : "RHSA-2026:3461",
    "cpe" : "cpe:/a:redhat:ai_inference_server:3.2::el9",
    "package" : "rhaiis/vllm-cuda-rhel9:sha256:dcb9d1cd005c40b6db6f893e56419e383b9dcc0d38315605cb1457e2af5354f7"
  }, {
    "product_name" : "Red Hat AI Inference Server 3.2",
    "release_date" : "2026-02-27T00:00:00Z",
    "advisory" : "RHSA-2026:3462",
    "cpe" : "cpe:/a:redhat:ai_inference_server:3.2::el9",
    "package" : "rhaiis/vllm-rocm-rhel9:sha256:53007894763e03f609c35c727cb738db3c2130b19fa0e1069c24240e0870fb7a"
  }, {
    "product_name" : "Red Hat Discovery 2",
    "release_date" : "2025-11-24T00:00:00Z",
    "advisory" : "RHSA-2025:21994",
    "cpe" : "cpe:/a:redhat:discovery:2::el9",
    "package" : "discovery/discovery-ui-rhel9:sha256:310df392f638ef6eca1a26db024ae2cb617db5932f886d2acddc92fb7289e740"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "libtiff",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "libtiff",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "compat-libtiff3",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "compat-libtiff3",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-8176\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-8176\nhttp://www.libtiff.org/\nhttps://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172\nhttps://gitlab.com/libtiff/libtiff/-/issues/707\nhttps://gitlab.com/libtiff/libtiff/-/merge_requests/727\nhttps://vuldb.com/?ctiid.317590\nhttps://vuldb.com/?id.317590\nhttps://vuldb.com/?submit.621796" ],
  "name" : "CVE-2025-8176",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}