RHSA-2017:0329-1: Important: qemu-kvm-rhev security update

Red Hat Enterprise Linux: An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0
(Mitaka).

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2017-2615, CVE-2017-2620

RHSA-2017:0328-1: Important: qemu-kvm-rhev security update

Red Hat Enterprise Linux: An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0
(Newton).

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2017-2615, CVE-2017-2620

USN-3212-1: LibTIFF vulnerabilities

Ubuntu Security Notice USN-3212-1

27th February, 2017

tiff vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

LibTIFF could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • tiff
    – Tag Image File Format (TIFF) library

Details

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
libtiff5

4.0.6-2ubuntu0.1
libtiff-tools

4.0.6-2ubuntu0.1
Ubuntu 16.04 LTS:
libtiff5

4.0.6-1ubuntu0.1
libtiff-tools

4.0.6-1ubuntu0.1
Ubuntu 14.04 LTS:
libtiff5

4.0.3-7ubuntu0.6
libtiff-tools

4.0.3-7ubuntu0.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7554,

CVE-2015-8668,

CVE-2016-10092,

CVE-2016-10093,

CVE-2016-10094,

CVE-2016-3622,

CVE-2016-3623,

CVE-2016-3624,

CVE-2016-3632,

CVE-2016-3658,

CVE-2016-3945,

CVE-2016-3990,

CVE-2016-3991,

CVE-2016-5314,

CVE-2016-5315,

CVE-2016-5316,

CVE-2016-5317,

CVE-2016-5320,

CVE-2016-5321,

CVE-2016-5322,

CVE-2016-5323,

CVE-2016-5652,

CVE-2016-5875,

CVE-2016-6223,

CVE-2016-8331,

CVE-2016-9273,

CVE-2016-9297,

CVE-2016-9448,

CVE-2016-9453,

CVE-2016-9532,

CVE-2016-9533,

CVE-2016-9534,

CVE-2016-9535,

CVE-2016-9536,

CVE-2016-9537,

CVE-2016-9538,

CVE-2016-9539,

CVE-2016-9540,

CVE-2017-5225

CVE-2016-5240

The DrawDashPolygon function in magick/render.c in GraphicsMagick before 1.3.24 and the SVG renderer in ImageMagick allow remote attackers to cause a denial of service (infinite loop) by converting a circularly defined SVG file.

CVE-2016-7553

The buf.pl before 2.20 script in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

CVE-2016-9817

Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving a (1) data or (2) prefetch abort with the ESR_EL2.EA bit set.