Mageia alert MGASA-2014-0492 (drupal)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2014-0492: Updated drupal packages fix security vulnerabilities | |
Date: | Wed, 26 Nov 2014 18:29:32 +0100 | |
Message-ID: | <20141126172933.033AF5A018@valstar.mageia.org> |
MGASA-2014-0492 - Updated drupal packages fix security vulnerabilities Publication date: 26 Nov 2014 URL: http://advisories.mageia.org/MGASA-2014-0492.html Type: security Affected Mageia releases: 3, 4 CVE: CVE-2014-9015, CVE-2014-9016 Description: Updated drupal packages fix security vulnerability: Aaron Averill discovered that a specially crafted request can give a user access to another user's session, allowing an attacker to hijack a random session (CVE-2014-9015). Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that the password hashing API allows an attacker to send specially crafted requests resulting in CPU and memory exhaustion. This may lead to the site becoming unavailable or unresponsive (denial of service) (CVE-2014-9016). anonymous users (CVE-2014-9016). References: - https://bugs.mageia.org/show_bug.cgi?id=14614 - https://www.drupal.org/SA-CORE-2014-006 - https://drupal.org/drupal-7.33 - https://drupal.org/drupal-7.33-release-notes - https://drupal.org/drupal-7.34 - https://drupal.org/drupal-7.34-release-notes - https://www.debian.org/security/2014/dsa-3075 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016 SRPMS: - 4/core/drupal-7.34-1.mga4 - 3/core/drupal-7.34-1.mga3