{"id":"JLSEC-2025-265","summary":"Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_d...","details":"Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.","modified":"2025-11-25T22:48:03.272097Z","published":"2025-11-25T22:18:43.603Z","upstream":["CVE-2022-0908"],"database_specific":{"license":"CC-BY-4.0","sources":[{"id":"CVE-2022-0908","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-0908","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0908","imported":"2025-11-25T21:56:30.614Z","published":"2022-03-11T18:15:27.077Z","modified":"2024-11-21T06:39:38.823Z"}]},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/383"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-10"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220506-0002/"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5108"}],"affected":[{"package":{"name":"Libtiff_jll","ecosystem":"Julia","purl":"pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"4.4.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-265.json"}}],"schema_version":"1.7.3"}