From daffeee5e909fad7c384d2ab5f759472db1e6c75 Mon Sep 17 00:00:00 2001 From: Simon Wright Date: Sun, 6 Jun 2021 10:48:40 +0200 Subject: security/vuxml: add www/drupal7 CVE --- security/vuxml/vuln.xml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) (limited to 'security/vuxml/vuln.xml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9f9941838dc0..b6a438010fe1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + drupal7 -- fix possible CSS + + + drupal7 + 7.07.80 + + + + +

Drupal Security team reports:

+
+

Drupal core's sanitization API fails to properly filter + cross-site scripting under certain circumstances. + Not all sites and users are affected, but configuration + changes to prevent the exploit might be impractical + and will vary between sites. Therefore, we recommend + all sites update to this release as soon as + possible. +

+
+ +
+ + CVE-2020-13672 + + + 2021-04-21 + 2021-06-06 + +
+ polkit -- local privilege escalation using polkit_system_bus_name_get_creds_sync -- cgit v1.2.3