|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0492 (drupal)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0492: Updated drupal packages fix security vulnerabilities
Date:  Wed, 26 Nov 2014 18:29:32 +0100
Message-ID:  <20141126172933.033AF5A018@valstar.mageia.org>

MGASA-2014-0492 - Updated drupal packages fix security vulnerabilities Publication date: 26 Nov 2014 URL: http://advisories.mageia.org/MGASA-2014-0492.html Type: security Affected Mageia releases: 3, 4 CVE: CVE-2014-9015, CVE-2014-9016 Description: Updated drupal packages fix security vulnerability: Aaron Averill discovered that a specially crafted request can give a user access to another user's session, allowing an attacker to hijack a random session (CVE-2014-9015). Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that the password hashing API allows an attacker to send specially crafted requests resulting in CPU and memory exhaustion. This may lead to the site becoming unavailable or unresponsive (denial of service) (CVE-2014-9016). anonymous users (CVE-2014-9016). References: - https://bugs.mageia.org/show_bug.cgi?id=14614 - https://www.drupal.org/SA-CORE-2014-006 - https://drupal.org/drupal-7.33 - https://drupal.org/drupal-7.33-release-notes - https://drupal.org/drupal-7.34 - https://drupal.org/drupal-7.34-release-notes - https://www.debian.org/security/2014/dsa-3075 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016 SRPMS: - 4/core/drupal-7.34-1.mga4 - 3/core/drupal-7.34-1.mga3


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds