<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=windows-1252">
</head>
<body text="#000000" bgcolor="#FFFFFF">
For anyone running Drupal 7.x or 8.x who isn't keeping up with
Drupal core news, please see the info below about patching a
critical vulnerability.<br>
<br>
Stay safe!<br>
<br>
Wade Sheldon<br>
GCE LTER<br>
<br>
<div class="moz-forward-container"><br>
<br>
-------- Forwarded Message --------
<table class="moz-email-headers-table" cellspacing="0"
cellpadding="0" border="0">
<tbody>
<tr>
<th nowrap="nowrap" valign="BASELINE" align="RIGHT">Subject:
</th>
<td>New Drupal Patch Released Today - Please patch ASAP</td>
</tr>
<tr>
<th nowrap="nowrap" valign="BASELINE" align="RIGHT">Date: </th>
<td>Wed, 25 Apr 2018 18:41:49 +0000</td>
</tr>
<tr>
<th nowrap="nowrap" valign="BASELINE" align="RIGHT">From: </th>
<td>Lance K Peiper <a class="moz-txt-link-rfc2396E" href="mailto:lpeiper@UGA.EDU"><lpeiper@UGA.EDU></a></td>
</tr>
<tr>
<th nowrap="nowrap" valign="BASELINE" align="RIGHT">Reply-To:
</th>
<td>Lance K Peiper <a class="moz-txt-link-rfc2396E" href="mailto:lpeiper@UGA.EDU"><lpeiper@UGA.EDU></a></td>
</tr>
<tr>
<th nowrap="nowrap" valign="BASELINE" align="RIGHT">To: </th>
<td><a class="moz-txt-link-abbreviated" href="mailto:UGANET@LISTSERV.UGA.EDU">UGANET@LISTSERV.UGA.EDU</a></td>
</tr>
</tbody>
</table>
<br>
<br>
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<meta name="Title" content="">
<meta name="Keywords" content="">
<meta name="Generator" content="Microsoft Word 15 (filtered
medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]-->
<style><!--
/* Font Definitions */
@font-face
{font-family:Arial;
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:Calibri;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal;
font-family:Calibri;
color:windowtext;}
span.EmailStyle18
{mso-style-type:personal-reply;
font-family:Calibri;
color:windowtext;}
span.msoIns
{mso-style-type:export-only;
mso-style-name:"";
text-decoration:underline;
color:teal;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
<div class="WordSection1">
<p class="MsoNormal">UGANet,<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">An update to the Drupal 7.x and 8.x patches
released on March 28<sup>th</sup> was released today.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><a
href="https://www.drupal.org/sa-core-2018-004"
moz-do-not-send="true">https://www.drupal.org/sa-core-2018-004</a><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Please patch any affected systems as soon
as possible. This issue is a new critical remote code
execution vulnerability and it is only a matter of time before
attackers attempt to exploit it.
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Thank you,<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif"">Lance Peiper<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif"">IT Associate Director<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif"">EITS - Information Security<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif"">University of Georgia<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif"">(706)542-5108<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif""><a class="moz-txt-link-abbreviated" href="mailto:lpeiper@uga.edu">lpeiper@uga.edu</a><o:p></o:p></span></p>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div style="border:none;border-top:solid #B5C4DF
1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span style="color:black">From: </span></b><span
style="color:black">Technical Discussion for UGA
Networking <a class="moz-txt-link-rfc2396E" href="mailto:UGANET@LISTSERV.UGA.EDU"><UGANET@LISTSERV.UGA.EDU></a> on behalf of
Brantley Hobbs <a class="moz-txt-link-rfc2396E" href="mailto:bhobbs@ITOS.UGA.EDU"><bhobbs@ITOS.UGA.EDU></a><br>
<b>Reply-To: </b>Brantley Hobbs
<a class="moz-txt-link-rfc2396E" href="mailto:bhobbs@itos.uga.edu"><bhobbs@itos.uga.edu></a><br>
<b>Date: </b>Wednesday, March 28, 2018 at 10:19 AM<br>
<b>To: </b><a class="moz-txt-link-rfc2396E" href="mailto:UGANET@LISTSERV.UGA.EDU">"UGANET@LISTSERV.UGA.EDU"</a>
<a class="moz-txt-link-rfc2396E" href="mailto:UGANET@LISTSERV.UGA.EDU"><UGANET@LISTSERV.UGA.EDU></a><br>
<b>Subject: </b>Heads up for folks hosting Drupal sites</span><span
style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Times New
Roman","serif""><o:p> </o:p></span></p>
</div>
<p class="MsoNormal">This is just a heads up for folks running
Drupal sites.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">Last week the Drupal security team
announced that today, Mar. 28<sup>th</sup>, between the hours
of 18:00-19:30 UTC, they will be releasing new versions of
Drupal for both Drupal 7 and Drupal 8. This patch is for
Drupal core; not for a module.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">I assume that since we were given a one
week warning for this patch, this is likely to address a
pretty bad, and pretty easy hole to exploit. Expect zero day
exploits on this, in other words.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">You probably want to make sure your sites
are patched as quickly as you can, as soon as the patch drops.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.5pt;font-family:Arial">Brantley Hobbs
</span><o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.5pt;font-family:Arial">Carl Vinson
Institute of Government</span><o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.5pt;font-family:Arial">The University of
Georgia</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.5pt;font-family:Arial">1180 East Broad
Street | Athens, GA 30602<br>
Phone: 706-542-2097 | Fax: 706-542-6535<br>
<a href="mailto:bhobbs@itos.uga.edu" moz-do-not-send="true">bhobbs@itos.uga.edu</a><br>
<a href="http://vinsoninstitute.org/" moz-do-not-send="true">www.vinsoninstitute.org</a></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D"><img
id="Picture_x005f_x0020_2"
src="cid:part4.7C2704D0.DA75E258@uga.edu"
alt="mail-Logo" class="" height="55" width="218"
border="0"></span></b><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
</div>
</body>
</html>