{"id":"JLSEC-2025-280","summary":"A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function","details":"A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.","modified":"2025-11-25T22:48:05.647490Z","published":"2025-11-25T22:18:43.603Z","upstream":["CVE-2022-1354"],"database_specific":{"license":"CC-BY-4.0","sources":[{"imported":"2025-11-25T21:56:30.627Z","published":"2022-08-31T16:15:09.520Z","modified":"2024-11-21T06:40:33.447Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1354","id":"CVE-2022-1354","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-1354"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2022-1354"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074404"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/319"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-10"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20221014-0007/"},{"type":"WEB","url":"https://www.debian.org/security/2023/dsa-5333"}],"affected":[{"package":{"name":"Libtiff_jll","ecosystem":"Julia","purl":"pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"4.4.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-280.json"}}],"schema_version":"1.7.3"}