svn commit: r417499 - head/security/vuxml
Jason Unovitch
junovitch at FreeBSD.org
Sat Jun 25 23:17:47 UTC 2016
Author: junovitch
Date: Sat Jun 25 23:17:46 2016
New Revision: 417499
URL: https://svnweb.freebsd.org/changeset/ports/417499
Log:
Document Wordpress vulnerabilities fixed in 4.5.3
PR: 210480 [1]
PR: 210581
Reported by: Mihail Timofeev <9267096 at gmail.com> [1]
Security: CVE-2016-5832
Security: CVE-2016-5833
Security: CVE-2016-5834
Security: CVE-2016-5835
Security: CVE-2016-5836
Security: CVE-2016-5837
Security: CVE-2016-5838
Security: CVE-2016-5839
Security: https://vuxml.FreeBSD.org/freebsd/bfcc23b6-3b27-11e6-8e82-002590263bf5.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Jun 25 22:48:41 2016 (r417498)
+++ head/security/vuxml/vuln.xml Sat Jun 25 23:17:46 2016 (r417499)
@@ -58,6 +58,64 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="bfcc23b6-3b27-11e6-8e82-002590263bf5">
+ <topic>wordpress -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <range><lt>4.5.3,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <name>zh-wordpress-zh_CN</name>
+ <name>zh-wordpress-zh_TW</name>
+ <range><lt>4.5.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adam Silverstein reports:</p>
+ <blockquote cite="https://wordpress.org/news/2016/06/wordpress-4-5-3/">
+ <p>WordPress 4.5.3 is now available. This is a security release for
+ all previous versions and we strongly encourage you to update your
+ sites immediately.</p>
+ <p>WordPress versions 4.5.2 and earlier are affected by several
+ security issues: redirect bypass in the customizer, reported by
+ Yassine Aboukir; two different XSS problems via attachment names,
+ reported by Jouko Pynnönenand Divyesh Prajapati; revision history
+ information disclosure, reported independently by John Blackbourn
+ from the WordPress security team and by Dan Moen from the Wordfence
+ Research Team; oEmbed denial of service reported by Jennifer Dodd
+ from Automattic; unauthorized category removal from a post, reported
+ by David Herrera from Alley Interactive; password change via stolen
+ cookie, reported by Michael Adams from the WordPress security team;
+ and some less secure sanitize_file_name edge cases reported by Peter
+ Westwood of the WordPress security team.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-5832</cvename>
+ <cvename>CVE-2016-5833</cvename>
+ <cvename>CVE-2016-5834</cvename>
+ <cvename>CVE-2016-5835</cvename>
+ <cvename>CVE-2016-5836</cvename>
+ <cvename>CVE-2016-5837</cvename>
+ <cvename>CVE-2016-5838</cvename>
+ <cvename>CVE-2016-5839</cvename>
+ <freebsdpr>ports/210480</freebsdpr>
+ <freebsdpr>ports/210581</freebsdpr>
+ <url>https://wordpress.org/news/2016/06/wordpress-4-5-3/</url>
+ <url>http://www.openwall.com/lists/oss-security/2016/06/23/9</url>
+ </references>
+ <dates>
+ <discovery>2016-06-18</discovery>
+ <entry>2016-06-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="66d77c58-3b1d-11e6-8e82-002590263bf5">
<topic>php -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list