Fedora 22 Security Update: php-twig-1.20.0-1.fc22

Resolved Bugs
1249259 – php-twig-v1.20.0 is available<br
## 1.20.0 (2015-08-12)
* forbid access to the Twig environment from templates and internal parts of Twig_Template
* fixed limited RCEs when in sandbox mode
* deprecated Twig_Template::getEnvironment()
* deprecated the _self variable for usage outside of the from and import tags
* added Twig_BaseNodeVisitor to ease the compatibility of node visitors between 1.x and 2.x
## 1.19.0 (2015-07-31)
* fixed wrong error message when including an undefined template in a child template
* added support for variadic filters, functions, and tests
* added support for extra positional arguments in macros
* added ignore_missing flag to the source function
* fixed batch filter with zero items
* deprecated Twig_Environment::clearTemplateCache()
* fixed sandbox disabling when using the include function

Fedora 23 Security Update: openssh-7.0p1-1.fc23

Resolved Bugs
1252639 – openssh-7.0p1 is available
1251777 – pam_ssh_agent_auth does not work with gnome-keyring-daemon or ssh-agent
1252852 – openssh: Use-after-free bug related to PAM support
1252853 – openssh: Use-after-free bug related to PAM support [fedora-all]
1252844 – openssh: Privilege separation weakness related to PAM support
1252854 – openssh: Privilege separation weakness related to PAM support [fedora-all]
1252862 – openssh: Incorrectly set TTYs to be world-writable [fedora-all]
1252861 – openssh: Incorrectly set TTYs to be world-writable<br
New upstream release, fixing several security issues and providing pam_ssh_agent_auth functionality.

Fedora 21 Security Update: php-twig-1.20.0-1.fc21

Resolved Bugs
1249259 – php-twig-v1.20.0 is available<br
## 1.20.0 (2015-08-12)
* forbid access to the Twig environment from templates and internal parts of Twig_Template
* fixed limited RCEs when in sandbox mode
* deprecated Twig_Template::getEnvironment()
* deprecated the _self variable for usage outside of the from and import tags
* added Twig_BaseNodeVisitor to ease the compatibility of node visitors between 1.x and 2.x
## 1.19.0 (2015-07-31)
* fixed wrong error message when including an undefined template in a child template
* added support for variadic filters, functions, and tests
* added support for extra positional arguments in macros
* added ignore_missing flag to the source function
* fixed batch filter with zero items
* deprecated Twig_Environment::clearTemplateCache()
* fixed sandbox disabling when using the include function

Sandbox bypass through Google Admin WebView

Posted by Vahagn Vardanyan on Aug 14

Sandbox bypass through Google Admin WebView

An issue was found in Google’s Android Admin application that allowed other
applications on the device to bypass sandbox restrictions to read arbitrary
files through the use of symbolic links.

The advisory can be downloaded here
<https://labs.mwrinfosecurity.com/system/assets/1021/original/mwri-advisory_sandbox_bypass_through_google_admin_webview.pdf>
.
Description

An issue was found when the…

ERPSCAN Research Advisory [ERPSCAN-15-012] SAP Afaria 7 XComms – Buffer Overflow

Posted by ERPScan inc on Aug 14

Application: SAP Afaria 7
Versions Affected: SAP Afaria 7, probably others
Vendor URL: http://SAP.com
Bugs: Buffer Overflow
Sent: 13.03.2015
Reported: 14.03.2015
Vendor response: 14.03.2015
Date of Public Advisory: 18.05.2015
Reference: SAP Security Note 2153690
Author: Dmitry Chastukhin (ERPScan)

Description

1. ADVISORY INFORMATION
Title: SAP Afaria 7
Advisory ID: [ERPSCAN-15-012]
Risk: High
Advisory URL:…

Ubuntu Security Notice USN-2710-1

Ubuntu Security Notice 2710-1 – Moritz Jodeit discovered that OpenSSH incorrectly handled usernames when using PAM authentication. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to perform user impersonation. Moritz Jodeit discovered that OpenSSH incorrectly handled context memory when using PAM authentication. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to bypass authentication or possibly execute arbitrary code. Various other issues were also addressed.