-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3997-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez October 10, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wordpress CVE ID : CVE-2017-14718 CVE-2017-14719 CVE-2017-14720 CVE-2017-14721 CVE-2017-14722 CVE-2017-14723 CVE-2017-14724 CVE-2017-14725 CVE-2017-14726 CVE-2017-14990 Debian Bug : 876274 877629 Several vulnerabilities were discovered in Wordpress, a web blogging tool. They would allow remote attackers to exploit path-traversal issues, perform SQL injections and various cross-site scripting attacks. For the oldstable distribution (jessie), these problems have been fixed in version 4.1+dfsg-1+deb8u15. For the stable distribution (stretch), these problems have been fixed in version 4.7.5+dfsg-2+deb9u1. For the testing distribution (buster), these problems have been fixed in version 4.8.2+dfsg-2. For the unstable distribution (sid), these problems have been fixed in version 4.8.2+dfsg-2. We recommend that you upgrade your wordpress packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlneAZYACgkQ3rYcyPpX RFtLWwgAqlmWIr+gUrKGKGdCCl1bHy/XI6RM3ezTXa3Mbkesu0JPh9l7JvxpinSm sAPjgPCMjzL89uJvUt8DsFlK7DsZv03NxZAeLoR7NbzPx0z1iHFUogbv32yZfKwI DNtBF9HjwTLxb8CSZG9XKgxk1RWwscoe6DqyyYTcVGdQonzPFUVoZxDCtrS6R2TZ el5ycFEpaoNb9hIaZvpYtXmDYeUibvHeV0SC9WfmBCXKpTX/0th/YK2hS+/P1Xcn xlLM4tVXgftYOnZYVMZugVcJuVWm8edoMOyv+kFYQQvSgwuyJuGNVePGrUod5kmV w9bAsukRwTjloWNFJQik9OzHahuNcw== =CMTQ -----END PGP SIGNATURE-----