lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 28 Feb 2016 23:14:09 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3498-1] drupal7 security advisory

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3498-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 28, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : drupal7
CVE ID         : not yet available

Multiple security vulnerabilities have been found in the Drupal content
management framework. For additional information, please refer to the
upstream advisory at https://www.drupal.org/SA-CORE-2016-001

For the oldstable distribution (wheezy), this problem has been fixed
in version 7.14-2+deb7u12.

For the stable distribution (jessie), this problem has been fixed in
version 7.32-1+deb8u6.

For the unstable distribution (sid), this problem has been fixed in
version 7.43-1.

We recommend that you upgrade your drupal7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=qetR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ