JLSEC-2025-317

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-317.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-317.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-317
Upstream
Published
2025-11-25T22:18:43.603Z
Modified
2025-11-25T22:48:09.896901Z
Summary
A vulnerability was found in LibTIFF up to 4.7.0
Details

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2025-09-11T16:58:39.627Z",
            "imported": "2025-11-25T21:56:30.673Z",
            "id": "CVE-2025-8176",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-8176",
            "published": "2025-07-26T04:16:10.527Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8176"
        }
    ]
}
References

Affected packages

Julia / Libtiff_jll

Package

Name
Libtiff_jll
Purl
pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.7.2+0