—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3997-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
October 10, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : wordpress
CVE ID : CVE-2017-14718 CVE-2017-14719 CVE-2017-14720 CVE-2017-14721
CVE-2017-14722 CVE-2017-14723 CVE-2017-14724 CVE-2017-14725
CVE-2017-14726 CVE-2017-14990
Debian Bug : 876274 877629
Several vulnerabilities were discovered in WordPress, a web blogging tool.
They would allow remote attackers to exploit path-traversal issues, perform SQL
injections and various cross-site scripting attacks.
For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u15.
For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u1.
For the testing distribution (buster), these problems have been fixed
in version 4.8.2+dfsg-2.
For the unstable distribution (sid), these problems have been fixed in
version 4.8.2+dfsg-2.
We recommend that you upgrade your wordpress packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlneAZYACgkQ3rYcyPpX
RFtLWwgAqlmWIr+gUrKGKGdCCl1bHy/XI6RM3ezTXa3Mbkesu0JPh9l7JvxpinSm
sAPjgPCMjzL89uJvUt8DsFlK7DsZv03NxZAeLoR7NbzPx0z1iHFUogbv32yZfKwI
DNtBF9HjwTLxb8CSZG9XKgxk1RWwscoe6DqyyYTcVGdQonzPFUVoZxDCtrS6R2TZ
el5ycFEpaoNb9hIaZvpYtXmDYeUibvHeV0SC9WfmBCXKpTX/0th/YK2hS+/P1Xcn
xlLM4tVXgftYOnZYVMZugVcJuVWm8edoMOyv+kFYQQvSgwuyJuGNVePGrUod5kmV
w9bAsukRwTjloWNFJQik9OzHahuNcw==
=CMTQ
—–END PGP SIGNATURE—–