Lucene search

K
debianDebianDEBIAN:DSA-2901-3:8BAFF
HistoryApr 21, 2014 - 6:07 a.m.

[SECURITY] [DSA 2901-3] wordpress regression update

2014-04-2106:07:09
lists.debian.org
8

0.014 Low

EPSS

Percentile

86.4%


Debian Security Advisory DSA-2901-3 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
April 21, 2014 http://www.debian.org/security/faq


Package : wordpress
CVE ID : CVE-2014-0165 CVE-2014-0166
Debian Bug : 744018

The update of wordpress in DSA-2901-2 introduced a wrong versioned
dependency on libjs-cropper, making the package uninstallable in the
oldstable distribution (squeeze). This update corrects that problem.

For reference the original advisory text follows.

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2014-0165

A user with a contributor role, using a specially crafted
request, can publish posts, which is reserved for users of the
next-higher role.

CVE-2014-0166

Jon Cave of the WordPress security team discovered that the
wp_validate_auth_cookie function in wp-includes/pluggable.php does
not properly determine the validity of authentication cookies,
allowing a remote attacker to obtain access via a forged cookie.

For the oldstable distribution (squeeze), this problem has been fixed
in version 3.6.1+dfsg-1~deb6u4.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian6allwordpress-l10n< 3.6.1+dfsg-1~deb6u4wordpress-l10n_3.6.1+dfsg-1~deb6u4_all.deb
Debian6allwordpress< 3.6.1+dfsg-1~deb6u4wordpress_3.6.1+dfsg-1~deb6u4_all.deb