{"id":"RHSA-2016:1547","summary":"Red Hat Security Advisory: libtiff security update","modified":"2025-11-22T11:11:42Z","published":"2024-09-15T23:09:54Z","upstream":["CVE-2014-8127","CVE-2014-8129","CVE-2014-8130","CVE-2014-9330","CVE-2014-9655","CVE-2015-1547","CVE-2015-7554","CVE-2015-8665","CVE-2015-8668","CVE-2015-8683","CVE-2015-8781","CVE-2015-8782","CVE-2015-8783","CVE-2015-8784","CVE-2016-3632","CVE-2016-3945","CVE-2016-3990","CVE-2016-3991","CVE-2016-5320"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1547"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1177893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185805"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1190703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1190709"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1294417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1294425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1294427"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1294444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1325093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1325095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1326246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1326249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1346687"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1547.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-8127"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-8127"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8127"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-8129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-8129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-8130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-8130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8130"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-9330"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-9330"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9330"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-9655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-9655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9655"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-1547"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-1547"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1547"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-7554"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-7554"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7554"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8665"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8665"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8665"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8668"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8683"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8683"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8781"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8782"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8782"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8782"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8783"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8784"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8784"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8784"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3632"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3945"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3945"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3945"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3990"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3990"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3990"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3991"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5320"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5320"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5320"}],"affected":[{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-devel","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}},{"package":{"name":"libtiff-static","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/libtiff-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.9.4-18.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1547.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}