JLSEC-2025-252

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-252.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-252.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-252
Upstream
Published
2025-11-25T22:18:43.603Z
Modified
2025-11-25T22:47:40.582525Z
Summary
An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/ti...
Details

An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900.

Database specific
{
    "sources": [
        {
            "modified": "2024-11-21T04:48:29.273Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-7663",
            "imported": "2025-11-25T21:56:30.592Z",
            "published": "2019-02-09T16:29:00.313Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7663",
            "id": "CVE-2019-7663"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / Libtiff_jll

Package

Name
Libtiff_jll
Purl
pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0+0