I've contacted the Debian security team. I hope they will act soon.

Thanks for raising this issue. Please test
http://static.natalian.org/2007-08-05/wordpress_2.0.11-1_i386.changes if
you can.

----- Forwarded message from Kai Hendry <[EMAIL PROTECTED]> -----

From: Kai Hendry <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: Wordpress 2.0.x security updates in stable]
Date: Tue, 7 Aug 2007 17:38:21 +0100
Reply-To: Kai Hendry <[EMAIL PROTECTED]>

I was hoping Micah or Noah would help sponsor an upload the 2.0.11
stable security update of Wordpress. I know Micah is busy and Noah has
not responded, so could someone please help out?

http://static.natalian.org/2007-08-05/wordpress_2.0.11-1_i386.changes

Kind regards,

----- Forwarded message from Kai Hendry <[EMAIL PROTECTED]> -----

From: Kai Hendry <[EMAIL PROTECTED]>
To: Micah Anderson <[EMAIL PROTECTED]>
Cc: Mark Jaquith <[EMAIL PROTECTED]>, Noah Meyerhans <[EMAIL PROTECTED]>
Subject: Wordpress 2.0.x security updates in stable
Date: Sun, 5 Aug 2007 11:10:13 +0100
Reply-To: Kai Hendry <[EMAIL PROTECTED]>

On 2007-08-04T13:39-0400 Micah Anderson wrote:
> This is great info... however, can you help us map this to the state WRT
> Debian packages in the various releases? As you have a much clearer
> understanding of what Debian package might have adopted what from
> upstream I'd much prefer your enlightened view on this, than me trying
> to guess based on the version numbers alone. 

Mark is the release manager for 2.0.x branch, so we're talking about the
Debian version in stable. Unless I've misunderstood you?

I must agree it can be difficult in Wordpress's trac to track how each
CVE is dealt with in each version.

> With that said, here are some guesses and questions:
> Summary:
> . A DSA should be issued for CVE-2007-1230, CVE-2007-2821, CVE-2007-3238
> and the version in proposed-updates should be updated to take these into
> account.

If you like. Do you want me to draft them?

> . The following need to be investigated to see if they apply to the
> versions that are currently in stable and unstable: CVE-2007-0540,
> CVE-2007-1244, 

I'm confident CVE-2007-1244 has been fixed in both branches. I don't
know much about CVE-2007-0540 yet.

> . These don't need any action: CVE-2007-1599 (minor), CVE-2007-2627
> (fixed 2 years ago), CVE-2007-1732 (disputed)
> . Needs to be fixed in unstable, but not stable: CVE-2007-3140

I'm confident CVE-2007-3140 is fixed in 2.2.2.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435848

> > CVE-2007-1244 - This is XSS, not CSRF.  It is fixed... likely in [5058]
> Not fixed in any debian package (there looks to be a bug ID or commit
> number that could be used to fix this though). What versions does this
> apply to? Does it need to be fixed in stable?

I just looked in 2.0.10 2.0.11 and
http://trac.wordpress.org/changeset/5058 'clean_url' is applied there.

> > CVE-2007-1599 - This won't be fixed for this version.  We are
> > discussing the issue.  It's not really an exploit so much as a very
> > slight Phishing aid, so it's not a huge priority.
> What versions does this one apply to? All existing WP versions? Only
> 2.x?

I'll chase this one up with Mark.

> > CVE-2007-1732 - There is no such parameter -- the bug is inadequately 
> > described.
> This should be disputed with Mitre then?
> > CVE-2007-2627 - This was fixed almost two years ago:
> > http://trac.wordpress.org/changeset/2884/trunk/wp-content/themes/default/searchform.php
> Is it safe to say that 2.0.9-1 has this fixed then? What Debian version
> that was uploaded contains this fix?

Comments Mark?




> Sounds like this will need to be pushed into the propoed-updates instead
> of the 2.0.10-1 version that is sitting there now.

I've just prepared:
http://static.natalian.org/2007-08-05/wordpress_2.0.11-1_i386.changes

I think I wrongly put stable-security instead of testing-security. Do I
need change it or could you please alter that?

Noah, will you please sponsor this upload again?

There are a bit of diffs on the import functions. If these importers
aren't patched, I've been told by upstream they become useless.

So I hope it can imaginatively fit under clause 2 of
http://release.debian.org/stable/4.0/4.0r1/ when potential users try
import their data from another blogging system.



Let me know what you think. Thanks for everyone's input here. :)



----- End forwarded message -----



----- End forwarded message -----

Attachment: signature.asc
Description: Digital signature

Reply via email to