Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f64b1adb by Moritz Muehlenhoff at 2018-04-08T12:33:24+02:00
wordpress fixed

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -39,13 +39,13 @@ CVE-2018-9838 (The caml_ba_deserialize function in 
byterun/bigarray.c in the sta
        NOTE: https://caml.inria.fr/mantis/view.php?id=7765
        NOTE: Before 4.06.0+beta1 the code is present in 
otherlibs/bigarray/bigarray_stubs.c
 CVE-2018-XXXX [wordpress: Don't treat localhost as same host by default]
-       - wordpress <unfixed> (bug #895034)
+       - wordpress 4.9.5+dfsg1-1 (bug #895034)
        NOTE: https://core.trac.wordpress.org/changeset/42894
 CVE-2018-XXXX [wordpress: Use safe redirects when redirecting the login page 
if SSL is forced]
-       - wordpress <unfixed> (bug #895034)
+       - wordpress 4.9.5+dfsg1-1 (bug #895034)
        NOTE: https://core.trac.wordpress.org/changeset/42892
 CVE-2018-XXXX [wordpress: Make sure the version string is correctly escaped 
for use in generator tags]
-       - wordpress <unfixed> (bug #895034)
+       - wordpress 4.9.5+dfsg1-1 (bug #895034)
        NOTE: https://core.trac.wordpress.org/changeset/42893
 CVE-2018-9837
        RESERVED
@@ -9151,12 +9151,13 @@ CVE-2018-6391 (A cross-site request forgery web 
vulnerability has been discovere
 CVE-2018-6390 (The WStr::assign function in kso.dll in Kingsoft WPS Office 
10.1.0.7106 ...)
        NOT-FOR-US: Kingsoft WPS Office
 CVE-2018-6389 (In WordPress through 4.9.2, unauthenticated attackers can cause 
a ...)
-       - wordpress <unfixed>
+       - wordpress <unfixed> (unimportant)
        NOTE: 
https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
        NOTE: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
        NOTE: https://wpvulndb.com/vulnerabilities/9021
        NOTE: disputed by upstream as best fixed at the server level
        NOTE: patch in progress in https://core.trac.wordpress.org/ticket/43308
+       NOTE: Architectual limitation, marginal impact
 CVE-2018-6388 (iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices allow 
remote ...)
        NOT-FOR-US: iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices
 CVE-2018-6387 (iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a 
hardcoded ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/f64b1adb6a85f8584530f33cd85e59ec6f4fed2e

---
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/f64b1adb6a85f8584530f33cd85e59ec6f4fed2e
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to