{"id":"RHSA-2014:0222","summary":"Red Hat Security Advisory: libtiff security update","modified":"2026-01-29T10:55:33.118419Z","published":"2024-09-15T21:23:42Z","upstream":["CVE-2010-2596","CVE-2013-1960","CVE-2013-1961","CVE-2013-4231","CVE-2013-4232","CVE-2013-4243","CVE-2013-4244"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2014:0222"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=610759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=995965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=995975"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=996052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=996468"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0222.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2010-2596"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2010-2596"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2596"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1960"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1960"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1961"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1961"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4231"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4232"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4243"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4243"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4243"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4244"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-10.el6_5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0222.json"}}],"schema_version":"1.7.3"}