diff options
author | morr <morr@pkgsrc.org> | 2017-09-21 19:24:46 +0000 |
---|---|---|
committer | morr <morr@pkgsrc.org> | 2017-09-21 19:24:46 +0000 |
commit | cacd6d1540d6d0f2b64686c65e0ea01a20f44d63 (patch) | |
tree | c567be3cb87005313e336709f32472698c2e0e7b | |
parent | 0a40f3d815eefd5fd1d1c9ebd7679cd6fbb911d4 (diff) | |
download | pkgsrc-cacd6d1540d6d0f2b64686c65e0ea01a20f44d63.tar.gz |
Security update to version 4.8.2
Security issues:
- $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability. Reported by Slavco.
- A cross-site scripting (XSS) vulnerability was discovered in the oEmbed discovery. Reported by xknown of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in the visual editor. Reported by Rodolfo Assis (@brutelogic) of Sucuri Security.
- A path traversal vulnerability was discovered in the file unzipping code. Reported by Alex Chapman (noxrnet).
- A cross-site scripting (XSS) vulnerability was discovered in the plugin editor. Reported by 陈瑞琦 (Chen Ruiqi).
- An open redirect was discovered on the user and term edit screens. Reported by Yasin Soliman (ysx).
- A path traversal vulnerability was discovered in the customizer. Reported by Weston Ruter of the WordPress Security Team.
- A cross-site scripting (XSS) vulnerability was discovered in template names. Reported by Luka (sikic).
- A cross-site scripting (XSS) vulnerability was discovered in the link modal. Reported by Anas Roubi (qasuar).
And 6 other fixes:
* Emoji
- #41584 - Upgrade Twemoji to 2.5.0
- #41852 - Fix UN flag test by returning the correct value.
*I18N
- #41794 - Support numbers in locales during installation
* Security
- #13377 - Add more sanitization in _cleanup_header_comment
*Widgets
- #41596 - New Text Widget recognizes HTML but does not render it in the front end
- #41622 - Text widget can show DOMDocument::loadHTML() warnings in admin when is_legacy_widget method is called
More on https://codex.wordpress.org/Version_4.8.2
-rw-r--r-- | www/wordpress/Makefile | 4 | ||||
-rw-r--r-- | www/wordpress/distinfo | 10 |
2 files changed, 7 insertions, 7 deletions
diff --git a/www/wordpress/Makefile b/www/wordpress/Makefile index 1447603a058..be1b2b06bd0 100644 --- a/www/wordpress/Makefile +++ b/www/wordpress/Makefile @@ -1,7 +1,7 @@ -# $NetBSD: Makefile,v 1.71 2017/09/06 09:03:05 wiz Exp $ +# $NetBSD: Makefile,v 1.72 2017/09/21 19:24:46 morr Exp $ DISTNAME= wordpress-${VERSION} -VERSION= 4.8.1 +VERSION= 4.8.2 CATEGORIES= www MASTER_SITES= https://wordpress.org/ diff --git a/www/wordpress/distinfo b/www/wordpress/distinfo index 0be5a2f3625..61f14406b40 100644 --- a/www/wordpress/distinfo +++ b/www/wordpress/distinfo @@ -1,6 +1,6 @@ -$NetBSD: distinfo,v 1.56 2017/08/07 20:12:14 morr Exp $ +$NetBSD: distinfo,v 1.57 2017/09/21 19:24:46 morr Exp $ -SHA1 (wordpress-4.8.1.tar.gz) = 5376cf41403ae26d51ca55c32666ef68b10e35a4 -RMD160 (wordpress-4.8.1.tar.gz) = 059128f0d06ae06fb5b813984139b952cebc91a4 -SHA512 (wordpress-4.8.1.tar.gz) = dfc166a48cd3542e277a74c6b6f551af7043fee45ac62ca764077e1a73fb487da62e57f1a60f60348d8bfe6ee4199c3ce261c042e20cf652f1b0233bd97d6b5c -Size (wordpress-4.8.1.tar.gz) = 8178289 bytes +SHA1 (wordpress-4.8.2.tar.gz) = a99115b3b6d6d7a1eb6c5617d4e8e704ed50f450 +RMD160 (wordpress-4.8.2.tar.gz) = 7098a1c7f353238d40f4d56934351c867226636f +SHA512 (wordpress-4.8.2.tar.gz) = e6b9dd7a3f9b510b1c85b0f9963d9303c9111f1d6ad471c5be076c5b9cf44ade5d1c761c336f44276ab88f69d6c842e6f33d637c7d76532ab88f12f49c385ca6 +Size (wordpress-4.8.2.tar.gz) = 8183815 bytes |