-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.2570
        Drupal core - Moderately critical - Third-party libraries -
                             SA-CORE-2022-010
                                26 May 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Drupal core
Publisher:         Drupal
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-29248  

Original Bulletin: 
   https://www.drupal.org/sa-core-2022-010

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010

Project:       Drupal core

Date:          2022-May-25

Security risk: Moderately critical 13/25
               AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon

Vulnerability: Third-party libraries

CVE IDs:       CVE-2022-29248

Description:

Drupal uses the third-party Guzzle library for handling HTTP requests and
responses to external services. Guzzle has released a security update which
does not affect Drupal core, but may affect some contributed projects or custom
code on Drupal sites.

We are issuing this security advisory outside our regular Drupal security
release window schedule since Guzzle has already published information about
the vulnerability, and vulnerabilities might exist in contributed modules or
custom modules that use Guzzle for outgoing requests. Guzzle has rated this
vulnerability as high-risk.

This advisory is not covered by Drupal Steward.

Solution:

Install the latest version:

  o If you are using Drupal 9.3, update to Drupal 9.3.14 .
  o If you are using Drupal 9.2, update to Drupal 9.2.20 .

All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive
security coverage. Note that Drupal 8 has reached its end of life .

Drupal 7 is not affected.

Reported By:

  o Dezso BICZO
  o mayela

Fixed By:

  o cilefen of the Drupal Security Team
  o xjm of the Drupal Security Team
  o Dezso BICZO
  o Greg Knaddison of the Drupal Security Team
  o Benji Fisher , provisional member of the Drupal Security Team
  o Damien McKenna of the Drupal Security Team
  o Alex Pott of the Drupal Security Team

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=tRdU
-----END PGP SIGNATURE-----