Gentoo Linux Security Advisory 201610-3 – A buffer overflow in Quagga might allow remote attackers to execute arbitrary code. Versions less than 1.0.20160315 are affected.
Monthly Archives: October 2016
Gentoo Linux Security Advisory 201610-04
Gentoo Linux Security Advisory 201610-4 – Multiple vulnerabilities have been fixed in libgcrypt,the worst of which results in predictable output from the random number generator. Versions less than 1.7.3 are affected.
ZendStudio IDE 13.5.1 Privilege Escalation
ZendStudio IDE version 13.5.1 suffers from a privilege escalation vulnerability.
Red Hat Security Advisory 2016-2038-01
Red Hat Security Advisory 2016-2038-01 – Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Security Fix: A CSRF flaw was found in Django, where an interaction between Google Analytics and Django’s cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. In this update, the parser for ”request.COOKIES” has been simplified to better match browser behavior and to mitigate this attack. ”request.COOKIES” may now contain cookies that are invalid according to RFC 6265 but are possible to set using ”document.cookie”.
Red Hat Security Advisory 2016-2042-01
Red Hat Security Advisory 2016-2042-01 – Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. The following packages have been upgraded to a newer upstream version: python-django. Security Fix: A CSRF flaw was found in Django, where an interaction between Google Analytics and Django’s cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. In this update, the parser for ”request.COOKIES” has been simplified to better match browser behavior and to mitigate this attack. ”request.COOKIES” may now contain cookies that are invalid according to RFC 6265 but are possible to set using ”document.cookie”.
Red Hat Security Advisory 2016-2040-01
Red Hat Security Advisory 2016-2040-01 – Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Security Fix: A CSRF flaw was found in Django, where an interaction between Google Analytics and Django’s cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. In this update, the parser for ”request.COOKIES” has been simplified to better match browser behavior and to mitigate this attack. ”request.COOKIES” may now contain cookies that are invalid according to RFC 6265 but are possible to set using ”document.cookie”.
Red Hat Security Advisory 2016-2039-01
Red Hat Security Advisory 2016-2039-01 – Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Security Fix: A CSRF flaw was found in Django, where an interaction between Google Analytics and Django’s cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. In this update, the parser for ”request.COOKIES” has been simplified to better match browser behavior and to mitigate this attack. ”request.COOKIES” may now contain cookies that are invalid according to RFC 6265 but are possible to set using ”document.cookie”.
Red Hat Security Advisory 2016-2041-01
Red Hat Security Advisory 2016-2041-01 – Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. The following packages have been upgraded to a newer upstream version: python-django. Security Fix: A CSRF flaw was found in Django, where an interaction between Google Analytics and Django’s cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. In this update, the parser for ”request.COOKIES” has been simplified to better match browser behavior and to mitigate this attack. ”request.COOKIES” may now contain cookies that are invalid according to RFC 6265 but are possible to set using ”document.cookie”.