Online retailers battling with fraud prevention are losing out on genuine sales by treating their customers like criminals, according to a new report by ThreatMetrix.
Mandriva Linux Security Advisory 2015-165 – By making use of maliciously-constructed zones or a rogue server, an attacker can exploit an oversight in the code BIND 9 uses to follow delegations in the Domain Name Service, causing BIND to issue unlimited queries in an attempt to follow the delegation. This can lead to resource exhaustion and denial of service.
Mandriva Linux Security Advisory 2015-163 – An integer overflow in liblzo before 2.07 allows attackers to cause a denial of service or possibly code execution in applications using performing LZO decompression on a compressed payload from the attacker. The grub2 package is built with a bundled copy of minilzo, which is a part of liblzo containing the vulnerable code.
Mandriva Linux Security Advisory 2015-160 – In IPython before 1.2, the origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on a user’s machine when the client visits a crafted malicious page.
Mandriva Linux Security Advisory 2015-162 – Clemens Fries reported that, when using Cinnamon, it was possible to bypass the screensaver lock. An attacker with physical access to the machine could use this flaw to take over the locked desktop session. This was fixed by including a patch for the root cause of the issue in gtk+3.0, which came from the implementation of popup menus in GtkWindow. This update also includes other patches from upstream to fix bugs affecting GtkFileChooser and GtkSpinButton, and a crash related to clipboard handling.
HP Security Bulletin HPSBGN03270 1 – A potential security vulnerability has been identified with HP Operations Analytics. This is the GlibC vulnerability known as “GHOST” which could be exploited remotely resulting in execution of code.. Revision 1 of this advisory.
Debian Linux Security Advisory 3209-1 – Multiple vulnerabilities were found in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol.