Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0519 - Security Advisory
Issued:
2010-07-08
Updated:
2010-07-08

RHSA-2010:0519 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: libtiff security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated libtiff packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

Multiple integer overflow flaws, leading to a buffer overflow, were
discovered in libtiff. An attacker could use these flaws to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2010-1411)

Multiple input validation flaws were discovered in libtiff. An attacker
could use these flaws to create a specially-crafted TIFF file that, when
opened, would cause an application linked against libtiff to crash.
(CVE-2010-2481, CVE-2010-2483, CVE-2010-2595, CVE-2010-2597)

Red Hat would like to thank Apple Product Security for responsibly
reporting the CVE-2010-1411 flaw, who credit Kevin Finisterre of
digitalmunition.com for the discovery of the issue.

All libtiff users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. All running
applications linked against libtiff must be restarted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 592361 - CVE-2010-1411 libtiff: integer overflows leading to heap overflow in Fax3SetupState
  • BZ - 610684 - CVE-2010-2595 libtiff: Array index error due improper handling of invalid ReferenceBlackWhite values
  • BZ - 610776 - CVE-2010-2597 libtiff: use of uninitialized values crash
  • BZ - 611895 - CVE-2010-2481 libtiff: TIFFExtractData out-of-bounds read crash
  • BZ - 611900 - CVE-2010-2483 libtiff: out-of-bounds read crash on images with invalid SamplesPerPixel values

CVEs

  • CVE-2010-1411
  • CVE-2010-2597
  • CVE-2010-2481
  • CVE-2010-2595
  • CVE-2010-2483
  • CVE-2010-4665

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
x86_64
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: ca81f55d4a12a458d762d0a53e7b27b4c6c140539dc550db1b4825979221f75b
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc
libtiff-devel-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: 04f18010b7dcb3c04367755ac86c5017f6936f00405b1e5302c2414dd89a50f9
ia64
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-3.8.2-7.el5_5.5.ia64.rpm SHA-256: 71dec2b757499e99a5b1d26af232f6ca57b299389dade9d6acbb7bbb6e82cb39
libtiff-devel-3.8.2-7.el5_5.5.ia64.rpm SHA-256: 108766b2d462051914e36af2ecd0ed23e70fbee930929d2d93714004f0ef8cfc
i386
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc

Red Hat Enterprise Linux Server 4

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
x86_64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
ia64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 0be12047885641aa8e4a805ad074195fc1949c41c9ef1165c62bcd45c0f559ca
libtiff-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 0be12047885641aa8e4a805ad074195fc1949c41c9ef1165c62bcd45c0f559ca
libtiff-devel-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 93a4073441edc531a22358f6bac7dc63cb8710b0edf07273c310288cff27bd19
libtiff-devel-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 93a4073441edc531a22358f6bac7dc63cb8710b0edf07273c310288cff27bd19
i386
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
x86_64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
ia64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 0be12047885641aa8e4a805ad074195fc1949c41c9ef1165c62bcd45c0f559ca
libtiff-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 0be12047885641aa8e4a805ad074195fc1949c41c9ef1165c62bcd45c0f559ca
libtiff-devel-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 93a4073441edc531a22358f6bac7dc63cb8710b0edf07273c310288cff27bd19
libtiff-devel-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 93a4073441edc531a22358f6bac7dc63cb8710b0edf07273c310288cff27bd19
i386
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4

Red Hat Enterprise Linux Workstation 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
x86_64
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: ca81f55d4a12a458d762d0a53e7b27b4c6c140539dc550db1b4825979221f75b
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc
libtiff-devel-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: 04f18010b7dcb3c04367755ac86c5017f6936f00405b1e5302c2414dd89a50f9
i386
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc

Red Hat Enterprise Linux Workstation 4

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
x86_64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
ia64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 0be12047885641aa8e4a805ad074195fc1949c41c9ef1165c62bcd45c0f559ca
libtiff-devel-3.6.1-12.el4_8.5.ia64.rpm SHA-256: 93a4073441edc531a22358f6bac7dc63cb8710b0edf07273c310288cff27bd19
i386
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4

Red Hat Enterprise Linux Desktop 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
x86_64
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: ca81f55d4a12a458d762d0a53e7b27b4c6c140539dc550db1b4825979221f75b
i386
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc

Red Hat Enterprise Linux Desktop 4

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
x86_64
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: af4e447816ba1d321e3cad82bbb5eb6325f36ef72480782d396427e6899b4602
libtiff-devel-3.6.1-12.el4_8.5.x86_64.rpm SHA-256: 62cb83ba91380e1bb2f994d57fda5a49b7b84c72b502965bc3bbb04105e4d1c6
i386
libtiff-3.6.1-12.el4_8.5.i386.rpm SHA-256: 9e1e1d15da45bda88adbd8cf30955e508394d5fe8f9f90bb7374e2834ec24fcd
libtiff-devel-3.6.1-12.el4_8.5.i386.rpm SHA-256: e156d02ad52a4af47d0614476f24121d26a47c5c0898f067b711845567703fb4

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
s390x
libtiff-3.8.2-7.el5_5.5.s390.rpm SHA-256: 89852584e3ee1a549d5cf99eb929560fcacce0ecf0c0954dd132a20511047b9e
libtiff-3.8.2-7.el5_5.5.s390x.rpm SHA-256: dfa8a505a59659dd2fa779f3bb689db46acbcfa9ae2da49144c0a74a63d15582
libtiff-devel-3.8.2-7.el5_5.5.s390.rpm SHA-256: 4f80e28fec9624cb2b41bfce36fe990a216d3e627bfca62f2bea5f21aee68f65
libtiff-devel-3.8.2-7.el5_5.5.s390x.rpm SHA-256: b135bcc9b8b418dc8eb5efe11cb45d527bb07596c55e4c2f4d325881c93f0335

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
s390x
libtiff-3.6.1-12.el4_8.5.s390.rpm SHA-256: 94f3587d69de4e3396cbf4676284b0c1f7d91520d94d70f7de30d5a25c249c81
libtiff-3.6.1-12.el4_8.5.s390x.rpm SHA-256: 29233cee32f62b66f486342fb3bf285ce8da951129cdc81d3f3ae96ea2e937a1
libtiff-devel-3.6.1-12.el4_8.5.s390x.rpm SHA-256: fff0e0dfc57ea1929da4e74299a0133b5411edac625aa5dea1297ccb64c8cf4e
s390
libtiff-3.6.1-12.el4_8.5.s390.rpm SHA-256: 94f3587d69de4e3396cbf4676284b0c1f7d91520d94d70f7de30d5a25c249c81
libtiff-devel-3.6.1-12.el4_8.5.s390.rpm SHA-256: 0f8a6700aca8d43c9f35126e630f906007757829381de6e6af2b6f351ef8ae3d

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
s390x
libtiff-3.6.1-12.el4_8.5.s390.rpm SHA-256: 94f3587d69de4e3396cbf4676284b0c1f7d91520d94d70f7de30d5a25c249c81
libtiff-3.6.1-12.el4_8.5.s390x.rpm SHA-256: 29233cee32f62b66f486342fb3bf285ce8da951129cdc81d3f3ae96ea2e937a1
libtiff-devel-3.6.1-12.el4_8.5.s390x.rpm SHA-256: fff0e0dfc57ea1929da4e74299a0133b5411edac625aa5dea1297ccb64c8cf4e
s390
libtiff-3.6.1-12.el4_8.5.s390.rpm SHA-256: 94f3587d69de4e3396cbf4676284b0c1f7d91520d94d70f7de30d5a25c249c81
libtiff-devel-3.6.1-12.el4_8.5.s390.rpm SHA-256: 0f8a6700aca8d43c9f35126e630f906007757829381de6e6af2b6f351ef8ae3d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
ppc
libtiff-3.8.2-7.el5_5.5.ppc.rpm SHA-256: dfd8069cb91004d186152412a9d2038fcf3b826803162c4abd7ae3b3123afb33
libtiff-3.8.2-7.el5_5.5.ppc64.rpm SHA-256: 3f216ae3a94b87674216f85d29f363becfc794ce925130c9b6b3c53222c126fc
libtiff-devel-3.8.2-7.el5_5.5.ppc.rpm SHA-256: e64cf98c556e09bf8bf3546050d74dc5069f14accea71c03155377f74f603137
libtiff-devel-3.8.2-7.el5_5.5.ppc64.rpm SHA-256: b2b95e8ec70655a14ff91723e17871e2bf2ba84b63c4c4d34df61e8b839db7b2

Red Hat Enterprise Linux for Power, big endian 4

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
ppc
libtiff-3.6.1-12.el4_8.5.ppc.rpm SHA-256: 49082c1887cb326a4b88bf80608549c0c8ab8528005137f5ec7bd8dd49cf3ba2
libtiff-3.6.1-12.el4_8.5.ppc64.rpm SHA-256: 28f81352428f252427c09e26efec2f18c848630801bcc149f4e7e5fd85496772
libtiff-devel-3.6.1-12.el4_8.5.ppc.rpm SHA-256: 04aaae2fc00bd98ad1ff6fd29cc8a66a3b78af11234c4ea6536dfdb725aeefea

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
libtiff-3.6.1-12.el4_8.5.src.rpm SHA-256: 3003ead30062025d1c491ff440cf12bc7cf24995a10923e0c01b6322d8c9dcf8
ppc
libtiff-3.6.1-12.el4_8.5.ppc.rpm SHA-256: 49082c1887cb326a4b88bf80608549c0c8ab8528005137f5ec7bd8dd49cf3ba2
libtiff-3.6.1-12.el4_8.5.ppc64.rpm SHA-256: 28f81352428f252427c09e26efec2f18c848630801bcc149f4e7e5fd85496772
libtiff-devel-3.6.1-12.el4_8.5.ppc.rpm SHA-256: 04aaae2fc00bd98ad1ff6fd29cc8a66a3b78af11234c4ea6536dfdb725aeefea

Red Hat Enterprise Linux Server from RHUI 5

SRPM
libtiff-3.8.2-7.el5_5.5.src.rpm SHA-256: aa5e4f59c3365820a25ad9d007310942a0b87d96307bd3a75b6a6296196bfa4d
x86_64
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: ca81f55d4a12a458d762d0a53e7b27b4c6c140539dc550db1b4825979221f75b
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc
libtiff-devel-3.8.2-7.el5_5.5.x86_64.rpm SHA-256: 04f18010b7dcb3c04367755ac86c5017f6936f00405b1e5302c2414dd89a50f9
i386
libtiff-3.8.2-7.el5_5.5.i386.rpm SHA-256: fc50547dc49dd2f3dae651ac8961fc3d9fa15e97b6a6876be4a41b739c1a3bf2
libtiff-devel-3.8.2-7.el5_5.5.i386.rpm SHA-256: 76c86adee52046ff371c070b1e6775d8a67e746783184b91b84b150823228adc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility