[SECURITY] [DSA 4193-1] wordpress security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4193-1                   security@xxxxxxxxxx
https://www.debian.org/security/                     Salvatore Bonaccorso
May 05, 2018                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2018-10100 CVE-2018-10101 CVE-2018-10102
Debian Bug     : 895034

Several vulnerabilities were discovered in wordpress, a web blogging
tool, which could allow remote attackers to compromise a site via
cross-site scripting, bypass restrictions or unsafe redirects. More
information can be found in the upstream advisory at
https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/

For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u17.

For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u3.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlruHnVfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0Ra9w/+IJaTGk2eUDAxJb0U0FtjONhU0T4HqTXrv7QIyUmMLYA0ey3poWRIZghK
1IY6/aGdmYw0wec21UITiqDHXlsUd6MYH4M9/4P9lwL86NPKV1scvAFyuw3d99tK
mhrZ8VUiusiQh8BKSd9l7Z5Y52MaVbUm2Ay7GV/fwaODSQAY4RnKBpWWZBAl7Nmp
AVNBJr1lo8hcFWf5uZXZ2UUoWYs4iNZWfr3dKPB9AD86E+2FZRztrPuOzR5HtBsg
kTSQn4CeiQMfsKivt+wJQKV5+jbJ9JzcMz+U6H3LjR5FfpckEM28eiwwwbEVgkq4
nXz6rhCbSZ/a4a88LOScMDFAKWHFrCouf74ziBAjJhW6vT1IzswR3rZ1/FhSrr6A
GdaoiAjYTfQIe7baL2N8RewPT0YB1tWLm0N58zTT62UFo4i6+Scu7JzatPTfPHno
J4Ht2R2PWt3/mz0jzHfpgUxxG7rbAyyJ3apviobcK3LVFqLSEvshfBv0EJBi/l8/
yHSiRLRoisKB+heNn06J5tL46km7Rkx8ykWZVvTd+7WaDCwqagyuRD5ZKqmIy/lI
/ZrRwIYhnmMYmcB3JpkrUmF21bj7X4ogc/BwFwHdNlIzj0PyUkrjJ7Egpl1m8MxT
C859O/2dNz8nzwAjA8kgRi+ePKbK5Tpc1UpAVGC/oWd1JxRZEMA=
=ARA/
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux