Updated drupal packages fix security vulnerabilities
Publication date: 26 Nov 2014Modification date: 26 Nov 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-9015 , CVE-2014-9016
Description
Updated drupal packages fix security vulnerability:
Aaron Averill discovered that a specially crafted request can give a user
access to another user's session, allowing an attacker to hijack a random
session (CVE-2014-9015).
Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that the
password hashing API allows an attacker to send specially crafted requests
resulting in CPU and memory exhaustion. This may lead to the site becoming
unavailable or unresponsive (denial of service) (CVE-2014-9016).
anonymous users (CVE-2014-9016).
References
- https://bugs.mageia.org/show_bug.cgi?id=14614
- https://www.drupal.org/SA-CORE-2014-006
- https://drupal.org/drupal-7.33
- https://drupal.org/drupal-7.33-release-notes
- https://drupal.org/drupal-7.34
- https://drupal.org/drupal-7.34-release-notes
- https://www.debian.org/security/2014/dsa-3075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016
SRPMS
3/core
- drupal-7.34-1.mga3
4/core
- drupal-7.34-1.mga4