{"id":"JLSEC-2025-259","summary":"LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving...","details":"LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.","modified":"2025-11-25T22:47:51.209260Z","published":"2025-11-25T22:18:43.603Z","upstream":["CVE-2022-22844"],"database_specific":{"sources":[{"modified":"2024-11-21T06:47:33.353Z","id":"CVE-2022-22844","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-22844","published":"2022-01-10T14:12:58.320Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22844","imported":"2025-11-25T21:56:30.601Z"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/355"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/287"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-10"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220311-0002/"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5108"}],"affected":[{"package":{"name":"Libtiff_jll","ecosystem":"Julia","purl":"pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.3.0+0"},{"fixed":"4.4.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-259.json"}}],"schema_version":"1.7.3"}