USN-7707-1: LibTIFF vulnerabilities

Publication date

20 August 2025

Overview

Several security issues were fixed in LibTIFF.


Packages

  • tiff - Tag Image File Format (TIFF) library

Details

It was discovered that LibTIFF incorrectly handled certain memory
operations when using tiffmedian tool. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this
issue to cause a denial of service. (CVE-2025-8176)

It was discovered that LibTIFF did not properly perform bounds checking
in certain operations when using thumbnail tool. An attacker could trick
a user into processing a specially crafted tiff image file and
potentially use this issue to cause a denial of service. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2025-8177)

It was discovered that LibTIFF incorrectly handled certain memory
operations when using tiff2ps tool. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this
issue to cause a denial of service. (

It was discovered that LibTIFF incorrectly handled certain memory
operations when using tiffmedian tool. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this
issue to cause a denial of service. (CVE-2025-8176)

It was discovered that LibTIFF did not properly perform bounds checking
in certain operations when using thumbnail tool. An attacker could trick
a user into processing a specially crafted tiff image file and
potentially use this issue to cause a denial of service. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2025-8177)

It was discovered that LibTIFF incorrectly handled certain memory
operations when using tiff2ps tool. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this
issue to cause a denial of service. (CVE-2025-8534)

It was discovered that LibTIFF did not properly perform bounds checking
in certain operations when using tiffcrop tool. An attacker could trick
a user into processing a specially crafted tiff image file and
potentially use this issue to cause a denial of service. (CVE-2025-8851)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
25.04 plucky libtiff-tools –  4.5.1+git230720-4ubuntu4.1
libtiff6 –  4.5.1+git230720-4ubuntu4.1
24.04 noble libtiff-tools –  4.5.1+git230720-4ubuntu2.3
libtiff6 –  4.5.1+git230720-4ubuntu2.3
22.04 jammy libtiff-tools –  4.3.0-6ubuntu0.11
libtiff5 –  4.3.0-6ubuntu0.11
20.04 focal libtiff-tools –  4.1.0+git191117-2ubuntu0.20.04.14+esm1  
libtiff5 –  4.1.0+git191117-2ubuntu0.20.04.14+esm1  
18.04 bionic libtiff-tools –  4.0.9-5ubuntu0.10+esm8  
libtiff5 –  4.0.9-5ubuntu0.10+esm8  
16.04 xenial libtiff-tools –  4.0.6-1ubuntu0.8+esm18  
libtiff5 –  4.0.6-1ubuntu0.8+esm18  
14.04 trusty libtiff-tools –  4.0.3-7ubuntu0.11+esm15  
libtiff5 –  4.0.3-7ubuntu0.11+esm15  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›