[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[SECURITY] Fedora 10 Update: drupal-6.14-1.fc10



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-9751
2009-09-18 23:22:41
--------------------------------------------------------------------------------

Name        : drupal
Product     : Fedora 10
Version     : 6.14
Release     : 1.fc10
URL         : http://www.drupal.org
Summary     : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites.  Drupal is highly
configurable, skinnable, and secure.

--------------------------------------------------------------------------------
Update Information:

Fixes SA-CORE-2009-008  http://drupal.org/node/579482    Remember to log in to
your site as the admin user before upgrading this package. After upgrading the
package, browse to http://host/drupal/update.php to run the upgrade script.
Multiple vulnerabilities and weaknesses were discovered in Drupal.  OpenID
association cross site request forgeries    The OpenID module in Drupal 6 allows
users to create an account or log into a Drupal site using one or more OpenID
identities.    The core OpenID module does not correctly implement Form API for
the form that allows one to link user accounts with OpenID identifiers. A
malicious user is therefore able to use cross site request forgeries to add
attacker controlled OpenID identities to existing accounts. These OpenID
identities can then be used to gain access to the affected accounts.    This
issue affects Drupal 6.x only.  OpenID impersonation    The OpenID module is not
a compliant implementation of the OpenID Authentication 2.0 specification. An
implementation error allows a user to access the account of another user when
they share the same OpenID 2.0 provider.    This issue affects Drupal 6.x only.
File upload    File uploads with certain extensions are not correctly processed
by the File API. This may lead to the creation of files that are executable by
Apache. The .htaccess that is saved into the files directory by Drupal should
normally prevent execution. The files are only executable when the server is
configured to ignore the directives in the .htaccess file.    This issue affects
Drupal 6.x only.  Session fixation    Drupal doesn't regenerate the session ID
when an anonymous user follows the one time login link used to confirm email
addresses and reset forgotten passwords. This enables a malicious user to fix
and reuse the session id of a victim under certain circumstances.    This issue
affects Drupal 5.x only.  Versions affected        * Drupal 6.x before version
6.14.      * Drupal 5.x before version 5.20.    Solution    Install the latest
version:        * If you are running Drupal 6.x then upgrade to Drupal 6.14.
* If you are running Drupal 5.x then upgrade to Drupal 5.20.    If you are
unable to upgrade immediately, you can apply a patch to secure your installation
until you are able to do a proper upgrade. Theses patches fix the security
vulnerabilities, but do not contain other fixes which were released in Drupal
6.14 or Drupal 5.20.        * To patch Drupal 6.13 use SA-
CORE-2009-008-6.13.patch.      * To patch Drupal 5.19 use SA-
CORE-2009-008-5.19.patch.    Important note: Some users using OpenID might not
be able to use the existing OpenID associations to login after the upgrade.
These users should use the one time login via password recovery to get access to
their user account and re-add desired associations. These users likely had
issues with OpenID logins prior to the upgrade.  Reported by    The session
fixation issue was reported by Noel Sharpe.  OpenID impersonation was reported
by Robert Metcalf.  OpenID association CSRF was reported by Heine Deelstra (*).
The file upload issue was reported by Heine Deelstra (*).    (*) Member of the
Drupal security team  Fixed by    The session fixation issue was fixed by Jakub
Suchy.  The OpenID and file upload issues were fixed by Heine Deelstra.  Contact
The security team for Drupal can be reached at security at drupal.org or via the
form at http://drupal.org/contact.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 16 2009 Jon Ciesla <limb jcomserv net> - 6.14-1
- Update to 6.14, SA-CORE-2009-008.
* Fri Jul 24 2009 Fedora Release Engineering <rel-eng lists fedoraproject org> - 6.13-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
* Thu Jul  2 2009 Jon Ciesla <limb jcomserv net> - 6.13-1
- Update to 6.11, SA-CORE-2009-007.
- Added clarifying text on module installation to readme, BZ 500707.
* Thu May 14 2009 Jon Ciesla <limb jcomserv net> - 6.12-1
- Update to 6.11, SA-CORE-2009-006.
* Thu Apr 30 2009 Jon Ciesla <limb jcomserv net> - 6.11-1
- Update to 6.11, SA-CORE-2009-005.
* Mon Apr 27 2009 Jon Ciesla <limb jcomserv net> - 6.10-2
- Added SELinux/sendmail note to README, BZ 497642.
* Thu Feb 26 2009 Jon Ciesla <limb jcomserv net> - 6.10-1
- Update to 6.10, SA-CORE-2009-003.
* Tue Feb 17 2009 Jon Ciesla <limb jcomserv net> - 6.9-2
- Drop pre script for files move, 472642.
- Updated drupal-README.fedora.
- Mark cron job noreplace, BZ 485567.
* Thu Jan 15 2009 Jon Ciesla <limb jcomserv net> - 6.9-1
- Upgrade to 6.9, SA-CORE-2009-001.
* Fri Jan  2 2009 Jon Ciesla <limb jcomserv net> - 6.8-1
- Upgrade to 6.8.
- Move files directories from sites to /var/lib/drupal/files/N for selinux reasons, 472642.
- Included script to move files outside of default, use at your own risk, patches welcome.
* Thu Dec 11 2008 Jon Ciesla <limb jcomserv net> - 6.7-1
- Upgrade to 6.7, SA-2008-073.
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update drupal' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]