Summary: | <www-apps/drupal-7.89: improper input validation | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tupone Alfredo <tupone> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.drupal.org/sa-core-2022-003 | ||
Whiteboard: | ~4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tupone Alfredo
2022-02-17 09:45:40 UTC
"Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data." Thanks for reporting! Please bump to 7.88 and 9.2.13. commit 7ddc64889b1bc2a991391d2a53f627d8c6bb2303 Author: Alfredo Tupone <tupone@gentoo.org> Date: Tue May 3 09:28:20 2022 +0200 www-apps/drupal: bump version Looks like we never had an affected version for 9.2.x. All done, thanks! |