-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3639-1 security@xxxxxxxxxx https://www.debian.org/security/ Salvatore Bonaccorso August 03, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wordpress CVE ID : CVE-2015-8834 CVE-2016-5832 CVE-2016-5834 CVE-2016-5835 CVE-2016-5837 CVE-2016-5838 CVE-2016-5839 Several vulnerabilities were discovered in wordpress, a web blogging tool, which could allow remote attackers to compromise a site via cross-site scripting, bypass restrictions, obtain sensitive revision-history information, or mount a denial of service. For the stable distribution (jessie), these problems have been fixed in version 4.1+dfsg-1+deb8u9. We recommend that you upgrade your wordpress packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXogzfAAoJEAVMuPMTQ89E5WMP/1j4ND+iguaU2/oJrQ5+c7oG 0nQsNCSyfd/FO7/hcBeH6D2g1oX91/KuJg6u7RePFG3+mH38KMnM8ZH3AGNyQ+gq w8/HruQ5fjugL1in2Os+uKLPN24xnHCV7uFDuX5++8ymMPpNTCy3YDuv6D2o/8jF eFjyHi5K0QlcIdo8IrIAN+1rq8t2tF8de16Rvm2z4A2j+O1QTM+so6ptI86QkqRQ J3tcahYBJKo0qsQWtVSX/kFD0udBPNKPbHoKEhKQbbNu4xMevjzgLJmdSnIneCkW 3YbbgRnRj1yoEY3nKeSAuHUIdy3/b3crtx83dqL5dgc/r35GBpIVyjQA5ENz5m67 SpvZ354MUvAjqtj5G0XAI4Jv0ID1SmfCioGaUwq6uyUfFYT/NKv4Mn+60OKQLTcv MPxVjjAXJ4O+PbRKyD21IQnr6VwwhXmzDUtuhGvn7pQg7FWOcH2u3qr7YVo216Ng 9sy3K9FEK+XnH2dwYov3G8xF+tbci5VSTiFZiz9G3KoxHhNABjHVOc/6os1eINMH Zq6NFLPCKzakDMEa4eziMWi2DexLHQjvQeWKi5Ac8tQGTguXuechWpDXzhUNjXOV PeuE19gGkPhLpSsC8cwe17vYtwt+6E03ohkufsmrEpLWNLK6CHP4RucKLAu9KBvP CJjyiYa6z5wwfpnhK9wJ =C78N -----END PGP SIGNATURE-----