[vpsFree.cz: community-list] Dnes v 18h - Drupal - Highly Critical - Remote code execution - contrib moduly

Jiri Volf jiri.volf at gmail.com
Wed Jul 13 09:47:39 CEST 2016


Ahoj,

dnes v 18h vyjdou záplaty vysoce kritických zranitelností modulů redakčního
systému Drupal.

Kdo provozujete Drupal, neváhejte aktualizovat, očekává se, že exploity
budou vytvořeny během hodin od zveřejnění.

Více info v přeposlaném oznámení.

Zdravím,

Jiří Volf

---------- Forwarded message ----------
From: <security-news at drupal.org>
Date: 2016-07-12 19:37 GMT+02:00
Subject: [Security-news] Drupal contrib - Highly Critical - Remote code
execution PSA-2016-001
To: security-news at drupal.org


View online: https://www.drupal.org/node/2764899

  * Advisory ID: DRUPAL-PSA-2016-001
  * Project: Drupal contributed modules
  * Version: 7.x
  * Date: 2016-July-12
  * Security risk: 22/25 ( Highly Critical)
    AC:None/A:None/CI:All/II:All/E:Theoretical/TD:All [1]
  * Vulnerability: Arbitrary PHP code execution

-------- DESCRIPTION
---------------------------------------------------------

There will be multiple releases of Drupal contributed modules on Wednesday
July 13th 2016 16:00 UTC that will fix highly critical remote code execution
vulnerabilities (risk scores up to 22/25 [2]). The Drupal Security Team
urges
you to reserve time for module updates at that time because exploits are
expected to be developed within hours/days. Release announcements will
appear
at the standard announcement locations. [3]

Drupal core is not affected. Not all sites will be affected. You should
review the published advisories on July 13th 2016 to see if any modules you
use are affected.
-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [4].

Learn more about the Drupal Security team and their policies [5], writing
secure code for Drupal [6], and  securing your site [7].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [8]


[1] https://www.drupal.org/security-team/risk-levels
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/security/contrib
[4] https://www.drupal.org/contact
[5] https://www.drupal.org/security-team
[6] https://www.drupal.org/writing-secure-code
[7] https://www.drupal.org/security/secure-configuration
[8] https://twitter.com/drupalsecurity

_______________________________________________
Security-news mailing list
Security-news at drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.vpsfree.cz/pipermail/community-list/attachments/20160713/d96df281/attachment-0002.html>


More information about the Community-list mailing list