it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010
- Date: Wed, 25 May 2022 20:21:41 +0000 (UTC)
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-core-2022-010
Project: Drupal core [1]
Date: 2022-May-25
Security risk: *Moderately critical* 13∕25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Third-party libraries
CVE IDs: CVE-2022-29248
Description:
Drupal uses the third-party Guzzle library for handling HTTP requests and
responses to external services. Guzzle has released a security update [3]
which does not affect Drupal core, but may affect some contributed projects
or custom code on Drupal sites.
We are issuing this security advisory outside our regular Drupal security
release window schedule [4] since Guzzle has already published information
about the vulnerability, and vulnerabilities might exist in contributed
modules or custom modules that use Guzzle for outgoing requests. Guzzle has
rated this vulnerability as high-risk.
This advisory is not covered by Drupal Steward.
Solution:
Install the latest version:
* If you are using Drupal 9.3, update to Drupal 9.3.14 [5].
* If you are using Drupal 9.2, update to Drupal 9.2.20 [6].
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive
security coverage. Note that Drupal 8 has reached its end of life [7].
Drupal 7 is not affected.
Reported By:
* Dezső BICZÓ [8]
* mayela [9]
Fixed By:
* cilefen [10] of the Drupal Security Team
* Jess [11] of the Drupal Security Team
* Dezső BICZÓ [12]
* Greg Knaddison [13] of the Drupal Security Team
* Benji Fisher [14], provisional member of the Drupal Security Team
* Damien McKenna [15] of the Drupal Security Team
* Alex Pott [16] of the Drupal Security Team
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
[4] https://www.drupal.org/node/1173280
[5] https://www.drupal.org/project/drupal/releases/9.3.9
[6] https://www.drupal.org/project/drupal/releases/9.2.20
[7] https://www.drupal.org/psa-2021-06-29
[8] https://www.drupal.org/user/315522
[9] https://www.drupal.org/user/3351026
[10] https://www.drupal.org/user/1850070
[11] https://www.drupal.org/user/65776
[12] https://www.drupal.org/user/315522
[13] https://www.drupal.org/user/36762
[14] https://www.drupal.org/user/683300
[15] https://www.drupal.org/user/108450
[16] https://www.drupal.org/user/157725
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010, security-news, 26.05.2022
Archiv bereitgestellt durch MHonArc 2.6.24.