Package : wordpress
Version : 5.0.21+dfsg1-0+deb10u1
CVE ID : not yet available
Two security vulnerabilities have been discovered in Wordpress, a
popular content management framework, a PHP File Upload bypass via the plugin
installer and a possible remote code execution vulnerability which requires
an attacker to control all the properties of a deserialized object. No CVE have
been assigned for these problems yet.
https://wordpress.org/news/2024/01/wordpress-6-4-3-maintenance-and-security-release/
For Debian 10 buster, this problem has been fixed in version
5.0.21+dfsg1-0+deb10u1.
We recommend that you upgrade your wordpress packages.
For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | wordpress-theme-twentynineteen | < 5.0.21+dfsg1-0+deb10u1 | wordpress-theme-twentynineteen_5.0.21+dfsg1-0+deb10u1_all.deb |
Debian | 10 | all | wordpress-theme-twentysixteen | < 5.0.21+dfsg1-0+deb10u1 | wordpress-theme-twentysixteen_5.0.21+dfsg1-0+deb10u1_all.deb |
Debian | 10 | all | wordpress-theme-twentyseventeen | < 5.0.21+dfsg1-0+deb10u1 | wordpress-theme-twentyseventeen_5.0.21+dfsg1-0+deb10u1_all.deb |
Debian | 10 | all | wordpress | < 5.0.21+dfsg1-0+deb10u1 | wordpress_5.0.21+dfsg1-0+deb10u1_all.deb |
Debian | 10 | all | wordpress-l10n | < 5.0.21+dfsg1-0+deb10u1 | wordpress-l10n_5.0.21+dfsg1-0+deb10u1_all.deb |