Debian: DSA-4677-1: wordpress security update

    Date 05 May 2020
    124
    Posted By LinuxSecurity Advisories
    Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4677-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Sebastien Delafond
    May 06, 2020                          https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : wordpress
    CVE ID         : CVE-2019-9787 CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 
                     CVE-2019-16220 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 
                     CVE-2019-16780 CVE-2019-16781 CVE-2019-17669 CVE-2019-17671 
                     CVE-2019-17672 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 
                     CVE-2019-20041 CVE-2019-20042 CVE-2019-20043 CVE-2020-11025 
                     CVE-2020-11026 CVE-2020-11027 CVE-2020-11028 CVE-2020-11029 
                     CVE-2020-11030
    Debian Bug     : 924546 939543 942459 946905 959391
    
    Several vulnerabilities were discovered in Wordpress, a web blogging
    tool. They allowed remote attackers to perform various Cross-Side
    Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
    files on the server, disclose private information, create open
    redirects, poison cache, and bypass authorization access and input
    sanitation.
    
    For the oldstable distribution (stretch), these problems have been fixed
    in version 4.7.5+dfsg-2+deb9u6.
    
    For the stable distribution (buster), these problems have been fixed in
    version 5.0.4+dfsg1-1+deb10u2.
    
    We recommend that you upgrade your wordpress packages.
    
    For the detailed security status of wordpress please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/wordpress
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.