Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in wordpress
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in wordpress
ID: FEDORA-2013-11630
Distribution: Fedora
Plattformen: Fedora 18
Datum: Mi, 3. Juli 2013, 07:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0236
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
Applikationen: wordpress

Originalnachricht

Name        : wordpress
Product : Fedora 18
Version : 3.5.2
Release : 1.fc18
URL : http://www.wordpress.org
Summary : Blog tool and publishing platform
Description :
Wordpress is an online publishing / weblog package that makes it very easy,
almost trivial, to get information out to people on the web.

-------------------------------------------------------------------------------
-
Update Information:

WordPress 3.5.2 is now available. This is the second maintenance release of
3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. The WordPress security team resolved seven security issues, and this release also contains some additional security hardening.

The security fixes included:
- Blocking server-side request forgery attacks, which could potentially enable
an attacker to gain access to a site.
- Disallow contributors from improperly publishing posts, reported by
Konstantin Kovshenin, or reassigning the post’s authorship, reported by Luke Bryan.
- An update to the SWFUpload external library to fix cross-site scripting
vulnerabilities. Reported by mala and Szymon Gruszecki. (Developers: More on SWFUpload here.)
- Prevention of a denial of service attack, affecting sites using
password-protected posts.
- An update to an external TinyMCE library to fix a cross-site scripting
vulnerability. Reported by Wan Ikram.
- Multiple fixes for cross-site scripting. Reported by Andrea Santese and
Rodrigo.
- Avoid disclosing a full file path when a upload fails. Reported by Jakub
Galczyk.

-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Jun 24 2013 Remi Collet <rcollet@redhat.com> - 3.5.2-1
- version 3.5.2, various bug and security fixes:
CVE-2013-2173 CVE-2013-2199 CVE-2013-2200 CVE-2013-2201
CVE-2013-2202 CVE-2013-2203 CVE-2013-2204
* Tue Feb 12 2013 Remi Collet <rcollet@redhat.com> - 3.5.1-2
- provides POP3 class #905867
POP3 is not from PHPMailer, but from SquirrelMail
- fix simplepie links (for all branches)
* Wed Jan 30 2013 Remi Collet <rcollet@redhat.com> - 3.5.1-1
- version 3.5.1, various bug and security fixes:
CVE-2013-0235, CVE-2013-0236 and CVE-2013-0237
- drop -f option from rm to break build if
upstream archive content change
- protect akismet content (from upstream .htaccess)
* Wed Jan 2 2013 Remi Collet <rcollet@redhat.com> - 3.5-3
- fix links to system PHPMailer library
* Sun Dec 16 2012 Remi Collet <rcollet@redhat.com> - 3.5-2
- fix use of system Simplepie
- give access from local (httpd 2.4)
* Wed Dec 12 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-1
- New upstream release.
* Tue Dec 4 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.5.RC3
- New upstream release candidate.
* Fri Nov 30 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.5.RC2
- New upstream release candidate.
* Sat Nov 24 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.5.RC1
- New upstream release candidate.
* Tue Nov 13 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.4.beta3
- New upstream beta3 version
* Mon Oct 29 2012 Remi Collet <rcollet@redhat.com> - 3.5-0.3.beta2
- use system PHPMailer
- requires needed php extensions
* Sat Oct 13 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.2.beta2
- New upstream beta2 version
* Thu Oct 4 2012 Matěj Cepl <mcepl@redhat.com> - 3.5-0.2.beta1
- New upstream beta1 version
- Don’t even bother with removing gettext.php ... it is not used anymore
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #976784 - CVE-2013-2199 CVE-2013-2200 CVE-2013-2201 CVE-2013-2202
CVE-2013-2203 CVE-2013-2204 CVE-2013-2205 wordpress: Multiple security flaws to be corrected within upstream 3.5.2 version
https://bugzilla.redhat.com/show_bug.cgi?id=976784
[ 2 ] Bug #973254 - CVE-2013-2173 wordpress: DoS when computing user-input
hash for certain password protected blogs
https://bugzilla.redhat.com/show_bug.cgi?id=973254
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update wordpress' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung