Ubuntu Security Notice USN-3148-1

Ubuntu Security Notice 3148-1 – Tavis Ormandy discovered multiple vulnerabilities in the way that Ghostscript processes certain Postscript files. If a user or automated system were tricked into opening a specially crafted file, an attacker could cause a denial of service or possibly execute arbitrary code. Multiple vulnerabilities were discovered in Ghostscript related to information disclosure. If a user or automated system were tricked into opening a specially crafted file, an attacker could expose sensitive data. Various other issues were also addressed.

python-tornado-4.4.2-1.fc24

Update to 4.4.2

Security fixes

* A difference in cookie parsing between Tornado and web browsers (especially when combined with Google Analytics) could allow an attacker to set arbitrary cookies and bypass XSRF protection. The cookie parser has been rewritten to fix this attack.

Backwards-compatibility notes

* Cookies containing certain special characters (in particular semicolon and square brackets) are now parsed differently.
* If the cookie header contains a combination of valid and invalid cookies, the valid ones will be returned (older versions of Tornado would reject the entire header for a single invalid cookie).

See also http://tornado.readthedocs.io/en/stable/releases/v4.4.0.html

CVE-2016-9638 (patrol)

In BMC Patrol before 9.13.10.02, the binary “listguests64” is configured with the setuid bit. However, when executing it, it will look for a binary named “virsh” using the PATH environment variable. The “listguests64” program will then run “virsh” using root privileges. This allows local users to elevate their privileges to root.

Android system_server Code Loading Bypass

As of Android Nougat, a new set of SELinux rules have been added which are designed to prevent system_server from loading arbitrary code into its address-space. However, as system_server is extremely privileged, there are a few vectors through which it may still load arbitrary code, thus bypassing the mitigation mentioned above.