ELSA-2025-20801

ELSA-2025-20801 - libtiff security update

Type:SECURITY
Impact:MODERATE
Release Date:2025-11-17

Description


[4.4.0-15]
- backport documentation change for CVE-2023-52355 (RHEL-17328)

[4.4.0-14]
- fix CVE-2023-52356: libtiff could crash in TIFFReadRGBATileExt when parsing crafted tiff file (RHEL-17337)


Related CVEs


CVE-2023-52356
CVE-2023-52355

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) libtiff-4.4.0-15.el9.src.rpm5fd0723ab8a656863f2f089fe3c180a65d805875cbcd15c1528a32da2c4fc177-ol9_aarch64_appstream
libtiff-4.4.0-15.el9.src.rpm5fd0723ab8a656863f2f089fe3c180a65d805875cbcd15c1528a32da2c4fc177-ol9_aarch64_codeready_builder
libtiff-4.4.0-15.el9.aarch64.rpm94ba98ab540351c2ad87cbfba1ba1e71e277cb15ebe4bf175c0011a5fb2f042f-ol9_aarch64_appstream
libtiff-devel-4.4.0-15.el9.aarch64.rpmf481307ebf81d5c0a310c774ba81a298304d22cf9fd444c5d08f59cbf84e64a4-ol9_aarch64_appstream
libtiff-tools-4.4.0-15.el9.aarch64.rpm814a6adbb35531c3a87e99e2e6b2ee45353c556e6c293727d10d6616510a0a73-ol9_aarch64_codeready_builder
Oracle Linux 9 (x86_64) libtiff-4.4.0-15.el9.src.rpm5fd0723ab8a656863f2f089fe3c180a65d805875cbcd15c1528a32da2c4fc177-ol9_x86_64_appstream
libtiff-4.4.0-15.el9.src.rpm5fd0723ab8a656863f2f089fe3c180a65d805875cbcd15c1528a32da2c4fc177-ol9_x86_64_codeready_builder
libtiff-4.4.0-15.el9.i686.rpm98e667760e63c76a7d49a3c71d92ead92b4a904d19b3ac288eaa1c49d311c081-ol9_x86_64_appstream
libtiff-4.4.0-15.el9.x86_64.rpmec79f1ce0dd29754dc9ccf1bc7aa455db45f60b76fe6ef113e89aa9c65de3d5f-ol9_x86_64_appstream
libtiff-devel-4.4.0-15.el9.i686.rpmf01b03520eb6d0594db99afc4383512f77fa49ca92fb8b3f69b0aadbf9f6c796-ol9_x86_64_appstream
libtiff-devel-4.4.0-15.el9.x86_64.rpme23bc46f77365f484dd1cc12e7badd6884731f62b6b2777e522bbb79062928c7-ol9_x86_64_appstream
libtiff-tools-4.4.0-15.el9.x86_64.rpmf6cbcb43f076326dd9291c181ad0924b306ddd0e54f01643c718dc42770346ec-ol9_x86_64_codeready_builder



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete