[vpsFree.cz: community-list] Dnes v 18h - Drupal - Highly Critical - Remote code execution - contrib moduly
Jiri Volf
jiri.volf at gmail.com
Wed Jul 13 09:47:39 CEST 2016
Ahoj,
dnes v 18h vyjdou záplaty vysoce kritických zranitelností modulů redakčního
systému Drupal.
Kdo provozujete Drupal, neváhejte aktualizovat, očekává se, že exploity
budou vytvořeny během hodin od zveřejnění.
Více info v přeposlaném oznámení.
Zdravím,
Jiří Volf
---------- Forwarded message ----------
From: <security-news at drupal.org>
Date: 2016-07-12 19:37 GMT+02:00
Subject: [Security-news] Drupal contrib - Highly Critical - Remote code
execution PSA-2016-001
To: security-news at drupal.org
View online: https://www.drupal.org/node/2764899
* Advisory ID: DRUPAL-PSA-2016-001
* Project: Drupal contributed modules
* Version: 7.x
* Date: 2016-July-12
* Security risk: 22/25 ( Highly Critical)
AC:None/A:None/CI:All/II:All/E:Theoretical/TD:All [1]
* Vulnerability: Arbitrary PHP code execution
-------- DESCRIPTION
---------------------------------------------------------
There will be multiple releases of Drupal contributed modules on Wednesday
July 13th 2016 16:00 UTC that will fix highly critical remote code execution
vulnerabilities (risk scores up to 22/25 [2]). The Drupal Security Team
urges
you to reserve time for module updates at that time because exploits are
expected to be developed within hours/days. Release announcements will
appear
at the standard announcement locations. [3]
Drupal core is not affected. Not all sites will be affected. You should
review the published advisories on July 13th 2016 to see if any modules you
use are affected.
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [4].
Learn more about the Drupal Security team and their policies [5], writing
secure code for Drupal [6], and securing your site [7].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [8]
[1] https://www.drupal.org/security-team/risk-levels
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/security/contrib
[4] https://www.drupal.org/contact
[5] https://www.drupal.org/security-team
[6] https://www.drupal.org/writing-secure-code
[7] https://www.drupal.org/security/secure-configuration
[8] https://twitter.com/drupalsecurity
_______________________________________________
Security-news mailing list
Security-news at drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.vpsfree.cz/pipermail/community-list/attachments/20160713/d96df281/attachment-0002.html>
More information about the Community-list
mailing list