{"id":"ALPINE-CVE-2025-8961","details":"A weakness has been identified in LibTIFF 4.7.0. This affects the function main of the file tiffcrop.c of the component tiffcrop. Executing manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been made available to the public and could be exploited.","modified":"2025-12-03T23:00:20.301492Z","published":"2025-08-14T13:15:38.037Z","upstream":["CVE-2025-8961"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2025-8961"}],"affected":[{"package":{"name":"tiff","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.7.1-r0"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0","4.4.0-r1","4.5.0-r0","4.5.0-r1","4.5.0-r2","4.5.0-r3","4.5.0-r4","4.5.0-r5","4.5.0-r6","4.5.1-r0","4.6.0-r0","4.6.0t-r0","4.7.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-8961.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.7.1-r0"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0","4.4.0-r1","4.5.0-r0","4.5.0-r1","4.5.0-r2","4.5.0-r3","4.5.0-r4","4.5.0-r5","4.5.0-r6","4.5.1-r0","4.6.0-r0","4.6.0t-r0","4.7.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-8961.json"}},{"package":{"name":"tiff","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/tiff?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.7.1-r0"}]}],"versions":["3.8.2-r0","3.8.2-r1","3.8.2-r2","3.8.2-r3","3.8.2-r4","3.9.5-r0","3.9.5-r1","4.0.1-r0","4.0.10-r0","4.0.10-r1","4.0.10-r2","4.0.2-r0","4.0.2-r1","4.0.3-r0","4.0.3-r1","4.0.3-r2","4.0.3-r3","4.0.6-r0","4.0.6-r1","4.0.6-r2","4.0.6-r3","4.0.7-r0","4.0.7-r1","4.0.7-r2","4.0.7-r3","4.0.8-r0","4.0.8-r1","4.0.9-r0","4.0.9-r1","4.0.9-r2","4.0.9-r3","4.0.9-r4","4.0.9-r5","4.0.9-r6","4.0.9-r7","4.0.9-r8","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.2.0-r0","4.2.0-r1","4.3.0-r0","4.3.0-r1","4.4.0-r0","4.4.0-r1","4.5.0-r0","4.5.0-r1","4.5.0-r2","4.5.0-r3","4.5.0-r4","4.5.0-r5","4.5.0-r6","4.5.1-r0","4.6.0-r0","4.6.0t-r0","4.7.0-r0","4.7.0-r1","4.7.0-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-8961.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}