lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 17 Jan 2018 13:40:59 +0000
From: Sebastien Delafond <seb@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4090-1] wordpress security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4090-1                   security@...ian.org
https://www.debian.org/security/                       Sebastien Delafond
January 17, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2017-9066 CVE-2017-16510 CVE-2017-17091 CVE-2017-17092 
                 CVE-2017-17093 CVE-2017-17094
Debian Bug     : 862816 883314 880528

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform SQL injections and
various Cross-Side Scripting (XSS) and Server-Side Request Forgery
(SSRF) attacks, as well as bypass some access restrictions.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u16.

For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u2.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlpfUAMACgkQEL6Jg/PV
nWSJ2ggAolEirv7BJGVCmyJED7dv7yAbSRLhsxd4wJYuMTBN2DmiaEAsmkM3mXUa
6WtnAAkI/PC7FQ9twqzUWl0dWg6B3TYFPsCHRxI6/gTHgvcSFQnRi9aiZ3OrzzrI
4zb5oosuZsLWW8ujuSOZ/FCMg5gWRr+3ZwFAGd7RKiT5nLah/wLJAmAa8+ihcmIh
5uyg4/qtZ0xjz5bmJ+NCdxBHdl+E6tTGF164q44i0xj4SxZMLoFnBeXFJYVO74lN
cWGZOJb+gt0EFQGymMqYzlCGxSmiez4MV2LPreSzahYDBF0NTXEnVW6SVITjNCn6
a3kHrYqiEVa/gUj0NG/2kI+v3EAjtQ==
=XYNh
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ