pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/www/wordpress Security update to version 4.7.2.
details: https://anonhg.NetBSD.org/pkgsrc/rev/3e970ceab02d
branches: trunk
changeset: 357773:3e970ceab02d
user: morr <morr%pkgsrc.org@localhost>
date: Sat Jan 28 10:14:15 2017 +0000
description:
Security update to version 4.7.2.
Changes:
Version 4.7.2
* Remote code execution (RCE) in PHPMailer ? No specific issue appears to
affect WordPress or any of the major plugins we investigated but, out of an
abundance of caution, we updated PHPMailer in this release. This issue was
reported to PHPMailer by Dawid Golunski and Paul Buonopane.
* The REST API exposed user data for all users who had authored a post of a
public post type. WordPress 4.7.1 limits this to only post types which have
specified that they should be shown within the REST API. Reported by
Krogsgard and Chris Jean.
* Cross-site scripting (XSS) via the plugin name or version header on
update-core.php. Reported by Dominik Schilling of the WordPress Security
Team.
* Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported
by Abdullah Hussam.
* Cross-site scripting (XSS) via theme name fallback. Reported by Mehmet Ince.
* Post via email checks mail.example.com if default settings aren?t changed.
Reported by John Blackbourn of the WordPress Security Team.
* A cross-site request forgery (CSRF) was discovered in the accessibility mode
of widget editing. Reported by Ronnie Skansing.
* Weak cryptographic security for multisite activation key. Reported by Jack.
Version 4.7.1
* The user interface for assigning taxonomy terms in Press This is shown to
users who do not have permissions to use it. Reported by David Herrera of
Alley Interactive.
* WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data.
WordPress core is not directly vulnerable to this issue, but we?ve added
hardening to prevent plugins and themes from accidentally causing a
vulnerability. Reported by Mo Jangda (batmoo).
* A cross-site scripting (XSS) vulnerability was discovered in the posts list
table. Reported by Ian Dunn of the WordPress Security Team.
diffstat:
www/wordpress/Makefile | 4 ++--
www/wordpress/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (28 lines):
diff -r 49a947fc0036 -r 3e970ceab02d www/wordpress/Makefile
--- a/www/wordpress/Makefile Sat Jan 28 09:10:25 2017 +0000
+++ b/www/wordpress/Makefile Sat Jan 28 10:14:15 2017 +0000
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.61 2017/01/09 19:10:16 morr Exp $
+# $NetBSD: Makefile,v 1.62 2017/01/28 10:14:15 morr Exp $
DISTNAME= wordpress-${VERSION}
-VERSION= 4.7
+VERSION= 4.7.2
CATEGORIES= www
MASTER_SITES= http://wordpress.org/
diff -r 49a947fc0036 -r 3e970ceab02d www/wordpress/distinfo
--- a/www/wordpress/distinfo Sat Jan 28 09:10:25 2017 +0000
+++ b/www/wordpress/distinfo Sat Jan 28 10:14:15 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.51 2017/01/09 19:10:16 morr Exp $
+$NetBSD: distinfo,v 1.52 2017/01/28 10:14:15 morr Exp $
-SHA1 (wordpress-4.7.tar.gz) = 1e14144c4db71421dc4ed22f94c3914dfc3b7020
-RMD160 (wordpress-4.7.tar.gz) = 8ffa3dce1b36ef68e8d6d03d2dc3d733529509fa
-SHA512 (wordpress-4.7.tar.gz) = 5bbdce5215dc5debc57e00376a94c9035f63d64d20aeb947e973a4dbe1803d262aa85ce27118ddbb3fadaf956ec90974bc76654149102a88c4b1e867740db4ca
-Size (wordpress-4.7.tar.gz) = 7993186 bytes
+SHA1 (wordpress-4.7.2.tar.gz) = 7b687f1af589c337124e6247229af209ec1d52c3
+RMD160 (wordpress-4.7.2.tar.gz) = 94d2c79636652913bdf3b4c7058003b6d5b3f7f2
+SHA512 (wordpress-4.7.2.tar.gz) = 610a820cf2eea39a60100515f68e95a7194a4e20df9c8158111b1978d5bc7c606dd2b7adf2f4019e9108a136e12eb2db7ae5ed75681cec23ffb901f8cc7fb83a
+Size (wordpress-4.7.2.tar.gz) = 7997959 bytes
Home |
Main Index |
Thread Index |
Old Index