aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjunovitch <junovitch@FreeBSD.org>2016-12-14 10:58:05 +0800
committerjunovitch <junovitch@FreeBSD.org>2016-12-14 10:58:05 +0800
commit95bacffff022a5aa01411ebbb1cf7813a6477f98 (patch)
tree1d4385ef4133c5f968f62c691d1c6cb848a466a6 /security
parent5fd67a0b9a0215453908e685757597c4304ca7be (diff)
downloadfreebsd-ports-gnome-95bacffff022a5aa01411ebbb1cf7813a6477f98.tar.gz
freebsd-ports-gnome-95bacffff022a5aa01411ebbb1cf7813a6477f98.tar.zst
freebsd-ports-gnome-95bacffff022a5aa01411ebbb1cf7813a6477f98.zip
Document Wordpress security issues in 4.6.1.
I didn't see any security updates in the 4.7 blog entry but we missed capturing these fixes from 4.6.1 earlier. Security: https://vuxml.FreeBSD.org/freebsd/54e50cd9-c1a8-11e6-ae1b-002590263bf5.html
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e0485b044def..98a282e94930 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,43 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="54e50cd9-c1a8-11e6-ae1b-002590263bf5">
+ <topic>wordpress -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <range><lt>4.6.1,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <name>zh-wordpress-zh_CN</name>
+ <name>zh-wordpress-zh_TW</name>
+ <range><lt>4.6.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jeremy Felt reports:</p>
+ <blockquote cite="https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/">
+ <p>WordPress versions 4.6 and earlier are affected by two security
+ issues: a cross-site scripting vulnerability via image filename,
+ reported by SumOfPwn researcher Cengiz Han Sahin; and a path
+ traversal vulnerability in the upgrade package uploader, reported
+ by Dominik Schilling from the WordPress security team.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2016-09-07</discovery>
+ <entry>2016-12-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="80a897a2-c1a6-11e6-ae1b-002590263bf5">
<topic>xen-kernel -- x86 CMPXCHG8B emulation fails to ignore operand size override</topic>
<affects>