[SECURITY] [DLA 321-1] wordpress security update

2015-09-30 Thread Mike Gabriel
Package: wordpress
Version: 3.6.1+dfsg-1~deb6u8
CVE ID : CVE-2015-5714 CVE-2015-5715
Debian Bug : #799140 

Various security issue have been fixed in the Debian LTS (squeeze)
version of the Wordpress content management system.

CVE-2015-5714

A cross-site scripting vulnerability when processing shortcode tags
has been discovered.

The issue has been fixed by not allowing unclosed HTML elements in
attributes.

CVE-2015-5715

A vulnerability has been discovered, allowing users without proper
permissions to publish private posts and make them sticky.

The issue has been fixed in the XMLRPC code of Wordpress by not
allowing private posts to be sticky.

Other issue(s)

   A cross-site scripting vulnerability in user list tables has been
   discovered.

   The issue has been fixed by URL-escaping email addresses in those user
   lists.

-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: Digital signature


[SECURITY] [DLA 319-1] freetype security update

2015-09-30 Thread Santiago Ruano Rincón
Package: freetype
Version: 2.4.2-2.1+squeeze6
CVE ID : CVE-2014-9745 CVE-2014-9746 CVE-2014-9747
Debian Bug : 798619 798620

Sergey Gorbaty reported issues related to the FreeType font engine.
FreeType improperly handled certain malformed font files, allowing
remote attackers to cause a Denial of Service when specially crafted
font files were used.

For Debian 6 “Squeeze”, these issues have been fixed in freetype version
2.4.2-2.1+squeeze6. We recommend you to upgrade your freetype packages.

Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/


signature.asc
Description: Digital signature