Important: libtiff (SL4, SL5, SL6)

Synopsis: Important: libtiff security and bug fix update
Issue Date: 2011-03-28
CVE Numbers: CVE-2011-1167

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

A heap-based buffer overflow flaw was found in the way libtiff processed
certain TIFF files encoded with a 4-bit run-length encoding scheme from
ThunderScan. An attacker could use this flaw to create a specially-crafted
TIFF file that, when opened, would cause an application linked against
libtiff to crash or, possibly, execute arbitrary code. (CVE-2011-1167)

This update also fixes the following bug:

* The RHSA-2011:0318 libtiff update introduced a regression that prevented
certain TIFF Internet Fax image files, compressed with the CCITT Group 4
compression algorithm, from being read. (BZ#688825)

All libtiff users should upgrade to these updated packages, which contain a
backported patch to resolve these issues. All running applications linked
against libtiff must be restarted for this update to take effect.

SL4
x86_64
libtiff-3.6.1-18.el4.i386.rpm
libtiff-3.6.1-18.el4.x86_64.rpm
libtiff-devel-3.6.1-18.el4.x86_64.rpm
i386
libtiff-3.6.1-18.el4.i386.rpm
libtiff-devel-3.6.1-18.el4.i386.rpm
SL5
x86_64
libtiff-3.8.2-7.el5_6.7.i386.rpm
libtiff-3.8.2-7.el5_6.7.x86_64.rpm
libtiff-devel-3.8.2-7.el5_6.7.i386.rpm
libtiff-devel-3.8.2-7.el5_6.7.x86_64.rpm
i386
libtiff-3.8.2-7.el5_6.7.i386.rpm
libtiff-devel-3.8.2-7.el5_6.7.i386.rpm
SL6
x86_64
libtiff-3.9.4-1.el6_0.2.i686.rpm
libtiff-3.9.4-1.el6_0.2.x86_64.rpm
libtiff-devel-3.9.4-1.el6_0.2.i686.rpm
libtiff-devel-3.9.4-1.el6_0.2.x86_64.rpm
libtiff-static-3.9.4-1.el6_0.2.x86_64.rpm
i386
libtiff-3.9.4-1.el6_0.2.i686.rpm
libtiff-devel-3.9.4-1.el6_0.2.i686.rpm
libtiff-static-3.9.4-1.el6_0.2.i686.rpm

– Scientific Linux Development Team