pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/www/wordpress Security update to version 4.7.2.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/3e970ceab02d
branches:  trunk
changeset: 357773:3e970ceab02d
user:      morr <morr%pkgsrc.org@localhost>
date:      Sat Jan 28 10:14:15 2017 +0000

description:
Security update to version 4.7.2.

Changes:

Version 4.7.2

* Remote code execution (RCE) in PHPMailer ? No specific issue appears to
  affect WordPress or any of the major plugins we investigated but, out of an
  abundance of caution, we updated PHPMailer in this release. This issue was
  reported to PHPMailer by Dawid Golunski and Paul Buonopane.
* The REST API exposed user data for all users who had authored a post of a
  public post type. WordPress 4.7.1 limits this to only post types which have
  specified that they should be shown within the REST API. Reported by
  Krogsgard and Chris Jean.
* Cross-site scripting (XSS) via the plugin name or version header on
  update-core.php. Reported by Dominik Schilling of the WordPress Security
  Team.
* Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported
  by Abdullah Hussam.
* Cross-site scripting (XSS) via theme name fallback. Reported by Mehmet Ince.
* Post via email checks mail.example.com if default settings aren?t changed.
  Reported by John Blackbourn of the WordPress Security Team.
* A cross-site request forgery (CSRF) was discovered in the accessibility mode
  of widget editing. Reported by Ronnie Skansing.
* Weak cryptographic security for multisite activation key. Reported by Jack.

Version 4.7.1

* The user interface for assigning taxonomy terms in Press This is shown to
  users who do not have permissions to use it. Reported by David Herrera of
  Alley Interactive.
* WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data.
  WordPress core is not directly vulnerable to this issue, but we?ve added
  hardening to prevent plugins and themes from accidentally causing a
  vulnerability. Reported by Mo Jangda (batmoo).
* A cross-site scripting (XSS) vulnerability was discovered in the posts list
  table. Reported by Ian Dunn of the WordPress Security Team.

diffstat:

 www/wordpress/Makefile |   4 ++--
 www/wordpress/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (28 lines):

diff -r 49a947fc0036 -r 3e970ceab02d www/wordpress/Makefile
--- a/www/wordpress/Makefile    Sat Jan 28 09:10:25 2017 +0000
+++ b/www/wordpress/Makefile    Sat Jan 28 10:14:15 2017 +0000
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.61 2017/01/09 19:10:16 morr Exp $
+# $NetBSD: Makefile,v 1.62 2017/01/28 10:14:15 morr Exp $
 
 DISTNAME=              wordpress-${VERSION}
-VERSION=               4.7
+VERSION=               4.7.2
 CATEGORIES=            www
 MASTER_SITES=          http://wordpress.org/
 
diff -r 49a947fc0036 -r 3e970ceab02d www/wordpress/distinfo
--- a/www/wordpress/distinfo    Sat Jan 28 09:10:25 2017 +0000
+++ b/www/wordpress/distinfo    Sat Jan 28 10:14:15 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.51 2017/01/09 19:10:16 morr Exp $
+$NetBSD: distinfo,v 1.52 2017/01/28 10:14:15 morr Exp $
 
-SHA1 (wordpress-4.7.tar.gz) = 1e14144c4db71421dc4ed22f94c3914dfc3b7020
-RMD160 (wordpress-4.7.tar.gz) = 8ffa3dce1b36ef68e8d6d03d2dc3d733529509fa
-SHA512 (wordpress-4.7.tar.gz) = 5bbdce5215dc5debc57e00376a94c9035f63d64d20aeb947e973a4dbe1803d262aa85ce27118ddbb3fadaf956ec90974bc76654149102a88c4b1e867740db4ca
-Size (wordpress-4.7.tar.gz) = 7993186 bytes
+SHA1 (wordpress-4.7.2.tar.gz) = 7b687f1af589c337124e6247229af209ec1d52c3
+RMD160 (wordpress-4.7.2.tar.gz) = 94d2c79636652913bdf3b4c7058003b6d5b3f7f2
+SHA512 (wordpress-4.7.2.tar.gz) = 610a820cf2eea39a60100515f68e95a7194a4e20df9c8158111b1978d5bc7c606dd2b7adf2f4019e9108a136e12eb2db7ae5ed75681cec23ffb901f8cc7fb83a
+Size (wordpress-4.7.2.tar.gz) = 7997959 bytes



Home | Main Index | Thread Index | Old Index