JLSEC-2025-264

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-264.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-264.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-264
Upstream
Published
2025-11-25T22:18:43.603Z
Modified
2025-11-25T22:47:45.365479Z
Summary
Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to ...
Details

Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2024-11-21T06:39:38.687Z",
            "imported": "2025-11-25T21:56:30.613Z",
            "id": "CVE-2022-0907",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-0907",
            "published": "2022-03-11T18:15:26.217Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0907"
        }
    ]
}
References

Affected packages

Julia / Libtiff_jll

Package

Name
Libtiff_jll
Purl
pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828

Affected ranges

Type
SEMVER
Events
Introduced
4.3.0+0
Fixed
4.4.0+0