Debian: DSA-4599-1: wordpress security update

    Date07 Jan 2020
    496
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create open redirects, poison cache, and bypass authorization access and
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4599-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.%MINIFYHTMLa138a5b9dbf2318b06992ec47c83af1d13%https://www.debian.org/security/                       Sebastien Delafond
    January 08, 2020                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : wordpress
    CVE ID         : CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 
                     CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 CVE-2019-16780 
                     CVE-2019-16781 CVE-2019-17669 CVE-2019-17671 CVE-2019-17672 
                     CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 CVE-2019-20041 
                     CVE-2019-20042 CVE-2019-20043
    Debian Bug     : 939543 942459 946905
    
    Several vulnerabilities were discovered in Wordpress, a web blogging
    tool. They allowed remote attackers to perform various Cross-Side
    Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
    open redirects, poison cache, and bypass authorization access and
    input sanitation.
    
    For the stable distribution (buster), these problems have been fixed in
    version 5.0.4+dfsg1-1+deb10u1.
    
    We recommend that you upgrade your wordpress packages.
    
    For the detailed security status of wordpress please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/wordpress
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.%MINIFYHTMLa138a5b9dbf2318b06992ec47c83af1d14%
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"35","type":"x","order":"1","pct":92.11,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"2","type":"x","order":"2","pct":5.26,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"1","type":"x","order":"3","pct":2.63,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.