Category Archives: Advisories

python3.7-3.7.13-2.fc36

Read Time:7 Second

FEDORA-2022-4c788bdc40

Packages in this update:

python3.7-3.7.13-2.fc36

Update description:

Security fix for CVE-2015-20107

Read More

Drupal core – Moderately critical – Third-party libraries – SA-CORE-2022-011

Read Time:1 Minute, 29 Second
Project: 
Date: 
2022-June-10
Vulnerability: 
Third-party libraries
CVE IDs: 
CVE-2022-31042
CVE-2022-31043
Description: 

Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released two security advisories:

Failure to strip the Cookie header on change in host or HTTP downgrade
Fix failure to strip Authorization header on HTTP downgrade

These do not affect Drupal core, but may affect some contributed projects or custom code on Drupal sites.

We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerabilities, and vulnerabilities might exist in contributed modules or custom modules that use Guzzle for outgoing requests. Guzzle has rated these vulnerabilities as high-risk.

This advisory is not covered by Drupal Steward.

Solution: 

Install the latest version:

If you are using Drupal 9.4, update to Drupal 9.4.0-rc2.
If you are using Drupal 9.3, update to Drupal 9.3.16.
If you are using Drupal 9.2, update to Drupal 9.2.21.

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.

Drupal 7 is not affected.

Fixed By: 
Heine of the Drupal Security Team
Dave Long, provisional member of the Drupal Security Team
Damien McKenna of the Drupal Security Team
Michael Hess of the Drupal Security Team
cilefen of the Drupal Security Team
xjm of the Drupal Security Team
Benji Fisher, provisional member of the Drupal Security Team

Read More

CVE-2017-20029

Read Time:22 Second

A vulnerability was found in PHPList 3.2.6 and classified as critical. This issue affects some unknown processing of the file /lists/index.php of the component Edit Subscription. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

Read More