Updated drupal packages fix security vulnerabilities
Publication date: 26 Nov 2014Modification date: 26 Nov 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-9015 , CVE-2014-9016
Description
Updated drupal packages fix security vulnerability: Aaron Averill discovered that a specially crafted request can give a user access to another user's session, allowing an attacker to hijack a random session (CVE-2014-9015). Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered that the password hashing API allows an attacker to send specially crafted requests resulting in CPU and memory exhaustion. This may lead to the site becoming unavailable or unresponsive (denial of service) (CVE-2014-9016). anonymous users (CVE-2014-9016).
References
- https://bugs.mageia.org/show_bug.cgi?id=14614
- https://www.drupal.org/SA-CORE-2014-006
- https://drupal.org/drupal-7.33
- https://drupal.org/drupal-7.33-release-notes
- https://drupal.org/drupal-7.34
- https://drupal.org/drupal-7.34-release-notes
- https://www.debian.org/security/2014/dsa-3075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9016
SRPMS
4/core
- drupal-7.34-1.mga4
3/core
- drupal-7.34-1.mga3