--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2017-52eae70b76
2017-02-02 16:34:45.422409
--------------------------------------------------------------------------------
Name : wordpress
Product : Fedora EPEL 5
Version : 4.7.2
Release : 1.el5
URL :
http://www.wordpress.org
Summary : Blog tool and publishing platform
Description :
Wordpress is an online publishing / weblog package that makes it very easy,
almost trivial, to get information out to people on the web.
Important information in /usr/share/doc/wordpress-4.7.2/README.fedora
--------------------------------------------------------------------------------
Update Information:
**WordPress 4.7.2 Security Release** WordPress 4.7.2 is now available. This is
a security release for all previous versions and we strongly encourage you to
update your sites immediately. WordPress versions 4.7.1 and earlier are
affected by three security issues: * The user interface for assigning
taxonomy terms in Press This is shown to users who do not have permissions to
use it. Reported by David Herrera of Alley Interactive. * WP_Query is
vulnerable to a SQL injection (SQLi) when passing unsafe data. WordPress core is
not directly vulnerable to this issue, but we���ve added hardening to prevent
plugins and themes from accidentally causing a vulnerability. Reported by Mo
Jangda (batmoo). * A cross-site scripting (XSS) vulnerability was discovered
in the posts list table. Reported by Ian Dunn of the WordPress Security Team.
---- **WordPress 4.7.1** Security and Maintenance Release This is a security
release for all previous versions and we strongly encourage you to update your
sites immediately. WordPress versions 4.7 and earlier are affected by eight
security issues: * Remote code execution (RCE) in PHPMailer ��� No specific
issue appears to affect WordPress or any of the major plugins we investigated
but, out of an abundance of caution, we updated PHPMailer in this release. This
issue was reported to PHPMailer by Dawid Golunski and Paul Buonopane. * The
REST API exposed user data for all users who had authored a post of a public
post type. WordPress 4.7.1 limits this to only post types which have specified
that they should be shown within the REST API. Reported by Krogsgard and Chris
Jean. * Cross-site scripting (XSS) via the plugin name or version header on
update-core.php. Reported by Dominik Schilling of the WordPress Security Team. *
Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported by
Abdullah Hussam. * Cross-site scripting (XSS) via theme name fallback.
Reported by Mehmet Ince. * Post via email checks
mail.example.com if default
settings aren���t changed. Reported by John Blackbourn of the WordPress Security
Team. * A cross-site request forgery (CSRF) was discovered in the
accessibility mode of widget editing. Reported by Ronnie Skansing. * Weak
cryptographic security for multisite activation key. Reported by Jack. Thank
you to the reporters for practicing responsible disclosure. In addition to the
security issues above, WordPress 4.7.1 fixes 62 bugs from 4.7. For more
information, see the [release
notes](https://codex.wordpress.org/Version_4.7.1)
or consult the [list of
changes](https://core.trac.wordpress.org/query?milestone=4.7.1).
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1417158 - CVE-2017-5610 CVE-2017-5611 CVE-2017-5612 wordpress: Multiple
security fixes in 4.7.2
https://bugzilla.redhat.com/show_bug.cgi?id=1417158
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update wordpress' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/...
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------