Debian: DSA-3075-1: drupal7 security update
Summary
CVE-2014-9015
Aaron Averill discovered that a specially crafted request can give a
user access to another user's session, allowing an attacker to
hijack a random session.
CVE-2014-9016
Michael Cullum, Javier Nieto and Andres Rojas Guerrero discovered
that the password hashing API allows an attacker to send
specially crafted requests resulting in CPU and memory
exhaustion. This may lead to the site becoming unavailable or
unresponsive (denial of service).
Custom configured session.inc and password.inc need to be audited as
well to verify if they are prone to these vulnerabilities. More
information can be found in the upstream advisory at
https://www.drupal.org/SA-CORE-2014-006
For the stable distribution (wheezy), these problems have been fixed in
version 7.14-2+deb7u8.
We recommend that you upgrade your drupal7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org