Advisory ID: DRUPAL-SA-CORE-2011-002 Project: Drupal core Version: 7.x Date: 2011-JUNE-29 Security risk: Highly critical Exploitable from: Remote Vulnerability: Access bypass Details: http://drupal.org/node/1204582 Solution: Update to Drupal 7.4
Changing priority to urgent. -- Fedora Bugzappers volunteer triage team https://fedoraproject.org/wiki/BugZappers
Working on it at this very moment. . .
drupal7-7.4-1.el6 has been submitted as an update for Fedora EPEL 6. https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6
drupal7-7.4-1.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/drupal7-7.4-1.fc14
drupal7-7.4-1.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/drupal7-7.4-1.fc15
drupal7-7.4-1.el5 has been submitted as an update for Fedora EPEL 5. https://admin.fedoraproject.org/updates/drupal7-7.4-1.el5
Package drupal7-7.4-1.el6: * should fix your issue, * was pushed to the Fedora EPEL 6 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=epel-testing drupal7-7.4-1.el6' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6 then log in and leave karma (feedback).
CVE Request: http://www.openwall.com/lists/oss-security/2011/07/11/2
The CVE identifier of CVE-2011-2687 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2011/07/12/16
drupal7-7.4-1.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report.
drupal7-7.4-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
drupal7-7.4-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
drupal7-7.4-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.