Hi Craig,
On Tue, Nov 3, 2020 at 12:00 PM Craig Small wrote:
> Hi Utkarsh, I've got Sid uploading now and will start on Buster in a moment.
Perfect! Thanks for your great work on wordpress!
- u
Hi Seb,
Sure are planning on doing that. I'll be using tracking the 5.0.x branch
from upstream, as discussed last time. Thanks to Utkarsh I've got all the
CVEs and descriptions right in front of me!
Hi Utkarsh, I've got Sid uploading now and will start on Buster in a moment.
- Craig
On Mon,
Hi Craig, Seb, Salvatore,
On Mon, 02 Nov 2020 08:01:44 +1100 Craig Small wrote:
> Debian LTS have released 4.7.19 which fixes this already.
Yep, I have already bumped the version and fixed these CVEs in stretch LTS.
Please let me know in case I can help with any of the other updates?
I don't me
On 02/11 08:01, Craig Small wrote:
> Wordpress versions less than 5.5.2 have the following security
> vulnerabilities:
>
> CVE-2020-28039: Protected meta that could lead to arbitrary file deletion.
> CVE-2020-28035: XML-RPC privilege escalation.
> CVE-2020-28036: XML-RPC privilege escalation.
> CV
Hi Craig,
On Mon, Nov 02, 2020 at 08:01:44AM +1100, Craig Small wrote:
> Package: wordpress
> Version: 5.5.1+dfsg1-2
> Severity: important
> Tags: security
> X-Debbugs-Cc: Debian Security Team
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Wordpress versions less than 5.5.2 have the
Package: wordpress
Version: 5.5.1+dfsg1-2
Severity: important
Tags: security
X-Debbugs-Cc: Debian Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Wordpress versions less than 5.5.2 have the following security
vulnerabilities:
CVE-2020-28039: Protected meta that could lead to arbit
6 matches
Mail list logo