Debian: DSA-2901-3: wordpress regression update

    Date21 Apr 2014
    CategoryDebian
    35
    Posted ByLinuxSecurity Advisories
    The update of wordpress in DSA-2901-2 introduced a wrong versioned dependency on libjs-cropper, making the package uninstallable in the oldstable distribution (squeeze). This update corrects that problem.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2901-3                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                      Salvatore Bonaccorso
    April 21, 2014                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : wordpress
    CVE ID         : CVE-2014-0165 CVE-2014-0166
    Debian Bug     : 744018
    
    The update of wordpress in DSA-2901-2 introduced a wrong versioned
    dependency on libjs-cropper, making the package uninstallable in the
    oldstable distribution (squeeze). This update corrects that problem.
    
    For reference the original advisory text follows.
    
    Several vulnerabilities were discovered in Wordpress, a web blogging
    tool. The Common Vulnerabilities and Exposures project identifies the
    following problems:
    
    CVE-2014-0165
    
        A user with a contributor role, using a specially crafted
        request, can publish posts, which is reserved for users of the
        next-higher role.
    
    CVE-2014-0166
    
        Jon Cave of the WordPress security team discovered that the
        wp_validate_auth_cookie function in wp-includes/pluggable.php does
        not properly determine the validity of authentication cookies,
        allowing a remote attacker to obtain access via a forged cookie.
    
    For the oldstable distribution (squeeze), this problem has been fixed
    in version 3.6.1+dfsg-1~deb6u4.
    
    We recommend that you upgrade your wordpress packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"14","type":"x","order":"1","pct":53.85,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":30.77,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.