<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for libtiff is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1442</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-02-28</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-02-28</InitialReleaseDate>
		<CurrentReleaseDate>2026-02-28</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-02-28</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libtiff security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libtiff is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">This  provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. The latest version of the TIFF specification is available on-line in several different formats.And contains command-line programs for manipulating TIFF format image files using the libtiff library.

Security Fix(es):

A NULL pointer dereference vulnerability (CWE-476) exists in the component libtiff/tif_open.c of libtiff up to version 4.7.1. When the application dereferences a pointer that it expects to be valid but is actually NULL, it can cause a crash or exit, affecting service availability.(CVE-2025-61143)

A critical vulnerability was found in libtiff up to version 4.7.1 (Image Processing Software). The issue is classified as CWE-121 Stack-based Buffer Overflow. A stack-based buffer overflow condition occurs when the buffer being overwritten is allocated on the stack (i.e., is a local variable or function parameter). This vulnerability impacts confidentiality, integrity, and availability.(CVE-2025-61144)

libtiff is a library for reading and writing TIFF (Tagged Image File Format) files. A double free vulnerability (CWE-415) exists in the `tools/tiffcrop.c` component of libtiff versions up to and including 4.7.1. The vulnerability stems from the program calling the `free()` function twice on the same memory address. An attacker could potentially exploit this to modify unexpected memory locations, impacting the confidentiality, integrity, and availability of the system, potentially leading to application crashes or arbitrary code execution.(CVE-2025-61145)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libtiff is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libtiff</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1442</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-61143</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-61144</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-61145</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-61143</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-61144</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-61145</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="libtiff-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-debuginfo-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-debuginfo-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-debugsource-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-debugsource-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-devel-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-devel-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-static-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-static-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-tools-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-tools-4.3.0-48.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="libtiff-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-4.3.0-48.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="libtiff-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-debuginfo-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-debuginfo-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-debugsource-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-debugsource-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-devel-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-devel-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-static-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-static-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libtiff-tools-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-tools-4.3.0-48.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="libtiff-help-4.3.0-48" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">libtiff-help-4.3.0-48.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference vulnerability (CWE-476) exists in the component libtiff/tif_open.c of libtiff up to version 4.7.1. When the application dereferences a pointer that it expects to be valid but is actually NULL, it can cause a crash or exit, affecting service availability.</Note>
		</Notes>
		<ReleaseDate>2026-02-28</ReleaseDate>
		<CVE>CVE-2025-61143</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libtiff security update</Description>
				<DATE>2026-02-28</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1442</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A critical vulnerability was found in libtiff up to version 4.7.1 (Image Processing Software). The issue is classified as CWE-121 Stack-based Buffer Overflow. A stack-based buffer overflow condition occurs when the buffer being overwritten is allocated on the stack (i.e., is a local variable or function parameter). This vulnerability impacts confidentiality, integrity, and availability.</Note>
		</Notes>
		<ReleaseDate>2026-02-28</ReleaseDate>
		<CVE>CVE-2025-61144</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.3</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libtiff security update</Description>
				<DATE>2026-02-28</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1442</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libtiff is a library for reading and writing TIFF (Tagged Image File Format) files. A double free vulnerability (CWE-415) exists in the `tools/tiffcrop.c` component of libtiff versions up to and including 4.7.1. The vulnerability stems from the program calling the `free()` function twice on the same memory address. An attacker could potentially exploit this to modify unexpected memory locations, impacting the confidentiality, integrity, and availability of the system, potentially leading to application crashes or arbitrary code execution.</Note>
		</Notes>
		<ReleaseDate>2026-02-28</ReleaseDate>
		<CVE>CVE-2025-61145</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.0</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libtiff security update</Description>
				<DATE>2026-02-28</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1442</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>