Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4775: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10

0
High
VulnerabilityCVE-2026-4775cvecve-2026-4775
Published: Tue Mar 24 2026 (03/24/2026, 14:42:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-4775 is a high-severity vulnerability in the libtiff library used by Red Hat Enterprise Linux 10. It involves a signed integer overflow in the putcontig8bitYCbCr44tile function triggered by a specially crafted TIFF file. This overflow leads to incorrect memory pointer calculations, causing an out-of-bounds heap write. Exploitation can result in denial of service via application crashes or potentially arbitrary code execution. The vulnerability requires local access with limited privileges and user interaction to trigger. No known exploits are currently reported in the wild. Due to the critical nature of the flaw affecting confidentiality, integrity, and availability, timely patching and mitigation are essential for affected systems.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 16:00:57 UTC

Technical Analysis

CVE-2026-4775 is a vulnerability identified in the libtiff library component of Red Hat Enterprise Linux 10. The flaw arises from a signed integer overflow or wraparound in the putcontig8bitYCbCr44tile function, which processes TIFF image files. When a specially crafted TIFF file is processed, the integer overflow causes incorrect calculations of memory pointers, leading to an out-of-bounds heap write. This memory corruption can destabilize the application, causing it to crash (denial of service) or, more critically, enable an attacker to execute arbitrary code with the privileges of the affected process. The vulnerability is exploitable remotely but requires user interaction, such as opening or processing the malicious TIFF file. The CVSS v3.1 score of 7.8 reflects high severity, with high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U). No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk once weaponized. The flaw underscores the risks of integer overflows in image processing libraries, which are commonly used in many applications and services.

Potential Impact

The vulnerability can have severe consequences for organizations running Red Hat Enterprise Linux 10 with the vulnerable libtiff library. Successful exploitation can lead to denial of service, disrupting critical services that rely on image processing. More alarmingly, arbitrary code execution could allow attackers to gain control over affected systems, potentially leading to data breaches, lateral movement within networks, and persistent access. Since libtiff is widely used in various applications, including web services, document processing, and multimedia tools, the attack surface is broad. Organizations handling untrusted TIFF files, such as email gateways, file upload services, or user-facing applications, are particularly at risk. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users may open or process untrusted files. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent future attacks.

Mitigation Recommendations

Organizations should prioritize applying official patches from Red Hat as soon as they become available to address this vulnerability. In the interim, restrict or monitor the processing of TIFF files from untrusted sources, especially in user-facing applications. Implement strict input validation and sandboxing for image processing components to limit the impact of potential exploitation. Employ application whitelisting and least privilege principles to reduce the risk of arbitrary code execution. Security teams should enhance monitoring for unusual application crashes or suspicious behavior related to image processing services. User education is important to reduce the likelihood of opening malicious files. Additionally, consider deploying runtime protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation attempts. Regularly review and update incident response plans to handle potential exploitation scenarios involving this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-24T14:26:05.988Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2b1b4f4197a8e3b48d204

Added to database: 3/24/2026, 3:45:56 PM

Last enriched: 3/24/2026, 4:00:57 PM

Last updated: 3/24/2026, 4:47:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses