发布时间: 2025年8月8日
修改时间: 2025年8月8日
A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Local | |
CVSS评分 | N/A | 2.5 |
Attack Complexity | High | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | None | |
User Interaction | None | |
Availability | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2799 | libtiff security update | 2025年8月14日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.3 | libtiff | Fixed |
V6 | libtiff | Fixed |
KY3.4-5A | libtiff | Fixed |
KY3.5.2 | libtiff | Fixed |