Linux Security
    Linux Security
    Linux Security

    Debian: DSA-4401-1: wordpress security update

    Date 01 Mar 2019
    8087
    Posted By LinuxSecurity Advisories
    Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and PHP injections attacks, delete files, leak potentially sensitive data, create posts of unauthorized types, or
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4401-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Sebastien Delafond
    March 01, 2019                        https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : wordpress
    CVE ID         : CVE-2018-20147 CVE-2018-20148 CVE-2018-20149 CVE-2018-20150 
                     CVE-2018-20151 CVE-2018-20152 CVE-2018-20153 CVE-2019-8942
    Debian Bug     : 916403
    
    Several vulnerabilities were discovered in Wordpress, a web blogging
    tool. They allowed remote attackers to perform various Cross-Side
    Scripting (XSS) and PHP injections attacks, delete files, leak
    potentially sensitive data, create posts of unauthorized types, or
    cause denial-of-service by application crash.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 4.7.5+dfsg-2+deb9u5.
    
    We recommend that you upgrade your wordpress packages.
    
    For the detailed security status of wordpress please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/wordpress
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.