JLSEC-2025-319

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-319.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-319.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-319
Upstream
Published
2025-11-25T22:18:43.603Z
Modified
2025-11-25T22:48:08.724263Z
Summary
A vulnerability was found in LibTIFF up to 4.7.0
Details

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2preadtiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2025-11-03T19:15:42.683Z",
            "imported": "2025-11-25T21:56:30.675Z",
            "id": "CVE-2024-13978",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-13978",
            "published": "2025-08-01T22:15:25.320Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13978"
        }
    ]
}
References

Affected packages

Julia / Libtiff_jll

Package

Name
Libtiff_jll
Purl
pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.7.2+0