Red Hat Enterprise Linux: Updated rhevm-dependencies packages that add one enhancement are now available.
Monthly Archives: September 2016
RHBA-2016:1923-1: 3.6.9 – rhevm-sdk-python bug fix update
Red Hat Enterprise Linux: Updated rhevm-python-sdk packages that fix several bugs are now available.
RHBA-2016:1921-1: rhevm-image-uploader bug fix update for RHEV 3.6.9
Red Hat Enterprise Linux: Updated rhevm-image-uploader packages that fix one bug are now available.
RHBA-2016:1920-1: 3.6.9 – rhevm-cli bug fix and enhancement update
Red Hat Enterprise Linux: Updated rhevm-cli packages that fix several bugs and add various enhancements
are now available.
RHBA-2016:1918-1: Red Hat OpenStack Platform 9 director Bug Fix Advisory
Red Hat Enterprise Linux: Updated packages that resolve various issues are now available for Red Hat
OpenStack Platform 9.0 director for RHEL 7.
RHBA-2016:1917-1: openstack-heat bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Orchestration packages that resolve various issues are
now available for Red Hat OpenStack Platform 9.0 (Mitaka) for RHEL 7.
RHBA-2016:1916-1: openstack-nova bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Compute packages that resolve various issues are now
available for Red Hat OpenStack Platform 9.0 (Mitaka) for RHEL 7.
RHBA-2016:1915-1: Red Hat OpenStack Platform 9 Bug Fix and Enhancement Advisory
Red Hat Enterprise Linux: Updated packages that resolve various issues are now available for Red Hat
OpenStack Platform 9.0 (Mitaka) for RHEL 7.
USN-3086-1: Irssi vulnerabilities
Ubuntu Security Notice USN-3086-1
21st September, 2016
irssi vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.04 LTS
Summary
Irssi could be made to crash if it received specially crafted network
traffic.
Software description
- irssi
– terminal based IRC client
Details
Gabriel Campana and Adrien Guinet discovered that the format parsing code
in Irssi did not properly verify 24bit color codes. A remote attacker could
use this to cause a denial of service (application crash). (CVE-2016-7044)
Gabriel Campana and Adrien Guinet discovered that a buffer overflow existed
in the format parsing code in Irssi. A remote attacker could use this to
cause a denial of service (application crash). (CVE-2016-7045)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.04 LTS:
-
irssi
0.8.19-1ubuntu1.2
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Irssi to make
all the necessary changes.
References
USN-3085-1: GDK-PixBuf vulnerabilities
Ubuntu Security Notice USN-3085-1
21st September, 2016
gdk-pixbuf vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
GDK-PixBuf could be made to crash or run programs as your login if it opened a specially crafted file.
Software description
- gdk-pixbuf
– GDK-Pixbuf library
Details
It was discovered that the GDK-PixBuf library did not properly handle specially
crafted bmp images, leading to a heap-based buffer overflow. If a user or
automated system were tricked into opening a specially crafted bmp file, a
remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting
in a denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-7552)
It was discovered that the GDK-PixBuf library contained an integer overflow
when handling certain images. If a user or automated system were tricked into
opening a crafted image file, a remote attacker could use this flaw to cause
GDK-PixBuf to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8875)
Franco Costantini discovered that the GDK-PixBuf library contained an
out-of-bounds write error when parsing an ico file. If a user or automated
system were tricked into opening a crafted ico file, a remote attacker could
use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6352)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.04 LTS:
-
libgdk-pixbuf2.0-0
2.32.2-1ubuntu1.2
- Ubuntu 14.04 LTS:
-
libgdk-pixbuf2.0-0
2.30.7-0ubuntu1.6
- Ubuntu 12.04 LTS:
-
libgdk-pixbuf2.0-0
2.26.1-1ubuntu1.5
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart your session to make
all the necessary changes.