Sicherheit: Mehrere Probleme in Drupal
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Drupal
ID: FEDORA-2015-14443
Distribution: Fedora
Plattformen: Fedora 23
Datum: Mo, 7. September 2015, 07:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6665
Applikationen: Drupal


Name        : drupal6
Product : Fedora 23
Version : 6.37
Release : 1.fc23
URL : http://www.drupal.org
Summary : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites. Drupal is highly
configurable, skinnable, and secure.

Update Information:

Maintenance and security release of the Drupal 6 series. This release fixes
**security vulnerabilities**. Sites are [urged to upgrade
immediately](https://www.drupal.org/node/1494290) after reading the notes below
and the security announcement: [Drupal Core - Critical - Multiple
Vulnerabilities - SA-CORE-2015-003](https://www.drupal.org/SA-CORE-2015-003) No
other fixes are included. No changes have been made to the .htaccess,
robots.txt or default settings.php files in this release, so upgrading custom
versions of those files is not necessary. #### Known issues: None. ####
changes since 6.36: * For security reasons, the autocomplete system now makes
Ajax requests to non-clean URLs only, although protection is also in place for
custom code that does so using clean URLs. There is a new form API #process
function on autocomplete-enabled text fields that is required for the
autocomplete functionality to work; custom and contributed modules should
that they are not overriding this #process function accidentally when altering
text fields on forms. Part of the security fix also includes changes to
theme_textfield(); it is recommended that sites which override this theme
function make those changes as well (see the theme_textfield section of this
diff for details). * When form API token validation fails (for example, when a
cross-site request forgery attempt is detected, or a user tries to submit a
after having logged out and back in again in the meantime), the form API now
skips calling form element value callbacks, except for a select list of
callbacks provided by Drupal core that are known to be safe. In rare cases,
could lead to data loss when a user submits a form and receives a token
validation error, but the overall effect is expected to be minor.

[ 1 ] Bug #1255662 - CVE-2015-6658 CVE-2015-6659 CVE-2015-6660 CVE-2015-6661
CVE-2015-6665 drupal: Several issues in 6.x and 7.x (SA-CORE-2015-003)

This update can be installed with the "yum" update program. Use
su -c 'yum update drupal6' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Unterstützer werden
Neue Nachrichten