{"id":"JLSEC-2025-289","summary":"processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow ...","details":"processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., \"WRITE of size 307203\") via a crafted TIFF image.","modified":"2025-11-25T22:47:57.942043Z","published":"2025-11-25T22:18:43.603Z","upstream":["CVE-2022-48281"],"database_specific":{"sources":[{"modified":"2025-04-03T14:15:23.037Z","published":"2023-01-23T03:15:09.447Z","id":"CVE-2022-48281","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48281","imported":"2025-11-25T21:56:30.646Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-48281"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/488"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202305-31"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230302-0004/"},{"type":"WEB","url":"https://www.debian.org/security/2023/dsa-5333"}],"affected":[{"package":{"name":"Libtiff_jll","ecosystem":"Julia","purl":"pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"4.5.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-289.json"}}],"schema_version":"1.7.3"}