-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2138-1 firstname.lastname@example.org http://www.debian.org/security/ Giuseppe Iuculano December 29, 2010 http://www.debian.org/security/faq
Package : wordpress Vulnerability : sql injection Problem type : remote Debian-specific: no CVE ID : CVE-2010-4257
Vladimir Kolesnikov discovered a SQL injection vulnerability in wordpress, a weblog manager. An authenticated users could execute arbitrary SQL commands via the Send Trackbacks field.
For the stable distribution (lenny), this problem has been fixed in version 2.5.1-11+lenny4.
For the unstable distribution (sid), and the testing distribution (squeeze), this problem has been fixed in version 3.0.2-1.
We recommend that you upgrade your wordpress package.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: email@example.com
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk0bR5gACgkQNxpp46476apkxQCeItmXehiI5WBr/yN5XqNu4cKe fTQAoIimJpOMVb0SEjhrVHw4fUSbTaeK =Fhjz -----END PGP SIGNATURE-----