[SECURITY] Fedora 22 Update: drupal6-6.37-1.fc22

updates at fedoraproject.org updates at fedoraproject.org
Sun Sep 6 04:54:10 UTC 2015

Fedora Update Notification
2015-09-06 02:02:43.948656

Name        : drupal6
Product     : Fedora 22
Version     : 6.37
Release     : 1.fc22
URL         : http://www.drupal.org
Summary     : An open-source content-management platform
Description :
Equipped with a powerful blend of features, Drupal is a Content Management
System written in PHP that can support a variety of websites ranging from
personal weblogs to large community-driven websites.  Drupal is highly
configurable, skinnable, and secure.

Update Information:

Maintenance and security release of the Drupal 6 series.  This release fixes
**security vulnerabilities**. Sites are [urged to upgrade
immediately](https://www.drupal.org/node/1494290) after reading the notes below
and the security announcement:  [Drupal Core - Critical - Multiple
Vulnerabilities - SA-CORE-2015-003](https://www.drupal.org/SA-CORE-2015-003) No
other fixes are included.  No changes have been made to the .htaccess,
robots.txt or default settings.php files in this release, so upgrading custom
versions of those files is not necessary.  #### Known issues:  None.  #### Major
changes since 6.36:  * For security reasons, the autocomplete system now makes
Ajax requests to non-clean URLs only, although protection is also in place for
custom code that does so using clean URLs. There is a new form API #process
function on autocomplete-enabled text fields that is required for the
autocomplete functionality to work; custom and contributed modules should ensure
that they are not overriding this #process function accidentally when altering
text fields on forms. Part of the security fix also includes changes to
theme_textfield(); it is recommended that sites which override this theme
function make those changes as well (see the theme_textfield section of this
diff for details). * When form API token validation fails (for example, when a
cross-site request forgery attempt is detected, or a user tries to submit a form
after having logged out and back in again in the meantime), the form API now
skips calling form element value callbacks, except for a select list of
callbacks provided by Drupal core that are known to be safe. In rare cases, this
could lead to data loss when a user submits a form and receives a token
validation error, but the overall effect is expected to be minor.

  [ 1 ] Bug #1255662 - CVE-2015-6658 CVE-2015-6659 CVE-2015-6660 CVE-2015-6661 CVE-2015-6665 drupal: Several issues in 6.x and 7.x (SA-CORE-2015-003)

This update can be installed with the "yum" update program. Use
su -c 'yum update drupal6' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list