From 41f344685b2010ba39806344890bbbcc35e37a7a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A5re=20Thor=20Olsen?= Date: Thu, 21 Mar 2019 07:33:36 +0100 Subject: [SECURITY] [DSA 4412-1] drupal7 security update --- english/security/2019/dsa-4412.data | 13 +++++++++++++ english/security/2019/dsa-4412.wml | 24 ++++++++++++++++++++++++ 2 files changed, 37 insertions(+) create mode 100644 english/security/2019/dsa-4412.data create mode 100644 english/security/2019/dsa-4412.wml diff --git a/english/security/2019/dsa-4412.data b/english/security/2019/dsa-4412.data new file mode 100644 index 00000000000..dffedcc6964 --- /dev/null +++ b/english/security/2019/dsa-4412.data @@ -0,0 +1,13 @@ +DSA-4412-1 drupal7 +2019-3-20 +not yet available +drupal7 +yes +yes +no + +#use wml::debian::security + + + + diff --git a/english/security/2019/dsa-4412.wml b/english/security/2019/dsa-4412.wml new file mode 100644 index 00000000000..fb7df6da1ac --- /dev/null +++ b/english/security/2019/dsa-4412.wml @@ -0,0 +1,24 @@ +security update + +

It was discovered that missing input sanitising in the file module of +Drupal, a fully-featured content management framework, could result in +cross-site scripting.

+ +

For additional information, please refer to the upstream advisory +at \ +https://www.drupal.org/sa-core-2019-004.

+ +

For the stable distribution (stretch), this problem has been fixed in +version 7.52-2+deb9u7.

+ +

We recommend that you upgrade your drupal7 packages.

+ +

For the detailed security status of drupal7 please refer to +its security tracker page at: +\ +https://security-tracker.debian.org/tracker/drupal7

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2019/dsa-4412.data" +# $Id: $ -- cgit v1.2.3