—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4090-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
January 17, 2018 https://www.debian.org/security/faq
– ————————————————————————-
Package : wordpress
CVE ID : CVE-2017-9066 CVE-2017-16510 CVE-2017-17091 CVE-2017-17092
CVE-2017-17093 CVE-2017-17094
Debian Bug : 862816 883314 880528
Several vulnerabilities were discovered in WordPress, a web blogging
tool. They allowed remote attackers to perform SQL injections and
various Cross-Side Scripting (XSS) and Server-Side Request Forgery
(SSRF) attacks, as well as bypass some access restrictions.
For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u16.
For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u2.
We recommend that you upgrade your wordpress packages.
For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlpfUAMACgkQEL6Jg/PV
nWSJ2ggAolEirv7BJGVCmyJED7dv7yAbSRLhsxd4wJYuMTBN2DmiaEAsmkM3mXUa
6WtnAAkI/PC7FQ9twqzUWl0dWg6B3TYFPsCHRxI6/gTHgvcSFQnRi9aiZ3OrzzrI
4zb5oosuZsLWW8ujuSOZ/FCMg5gWRr+3ZwFAGd7RKiT5nLah/wLJAmAa8+ihcmIh
5uyg4/qtZ0xjz5bmJ+NCdxBHdl+E6tTGF164q44i0xj4SxZMLoFnBeXFJYVO74lN
cWGZOJb+gt0EFQGymMqYzlCGxSmiez4MV2LPreSzahYDBF0NTXEnVW6SVITjNCn6
a3kHrYqiEVa/gUj0NG/2kI+v3EAjtQ==
=XYNh
—–END PGP SIGNATURE—–