summaryrefslogtreecommitdiff
path: root/www
diff options
context:
space:
mode:
authormorr <morr@pkgsrc.org>2017-01-28 10:14:15 +0000
committermorr <morr@pkgsrc.org>2017-01-28 10:14:15 +0000
commitea252b9a63fe42a6423da4bfedffee147ea44575 (patch)
tree6b0a1922801b7e7a2a93ff411ea6de8c02d7c9ae /www
parentd6997de0ab8b1835937322b9883fcb07fb1503c0 (diff)
downloadpkgsrc-ea252b9a63fe42a6423da4bfedffee147ea44575.tar.gz
Security update to version 4.7.2.
Changes: Version 4.7.2 * Remote code execution (RCE) in PHPMailer – No specific issue appears to affect WordPress or any of the major plugins we investigated but, out of an abundance of caution, we updated PHPMailer in this release. This issue was reported to PHPMailer by Dawid Golunski and Paul Buonopane. * The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API. Reported by Krogsgard and Chris Jean. * Cross-site scripting (XSS) via the plugin name or version header on update-core.php. Reported by Dominik Schilling of the WordPress Security Team. * Cross-site request forgery (CSRF) bypass via uploading a Flash file. Reported by Abdullah Hussam. * Cross-site scripting (XSS) via theme name fallback. Reported by Mehmet Ince. * Post via email checks mail.example.com if default settings aren’t changed. Reported by John Blackbourn of the WordPress Security Team. * A cross-site request forgery (CSRF) was discovered in the accessibility mode of widget editing. Reported by Ronnie Skansing. * Weak cryptographic security for multisite activation key. Reported by Jack. Version 4.7.1 * The user interface for assigning taxonomy terms in Press This is shown to users who do not have permissions to use it. Reported by David Herrera of Alley Interactive. * WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data. WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability. Reported by Mo Jangda (batmoo). * A cross-site scripting (XSS) vulnerability was discovered in the posts list table. Reported by Ian Dunn of the WordPress Security Team.
Diffstat (limited to 'www')
-rw-r--r--www/wordpress/Makefile4
-rw-r--r--www/wordpress/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/www/wordpress/Makefile b/www/wordpress/Makefile
index f937dbe08f7..79118e8bc05 100644
--- a/www/wordpress/Makefile
+++ b/www/wordpress/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.61 2017/01/09 19:10:16 morr Exp $
+# $NetBSD: Makefile,v 1.62 2017/01/28 10:14:15 morr Exp $
DISTNAME= wordpress-${VERSION}
-VERSION= 4.7
+VERSION= 4.7.2
CATEGORIES= www
MASTER_SITES= http://wordpress.org/
diff --git a/www/wordpress/distinfo b/www/wordpress/distinfo
index 762908759bc..ea5da3f1d27 100644
--- a/www/wordpress/distinfo
+++ b/www/wordpress/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.51 2017/01/09 19:10:16 morr Exp $
+$NetBSD: distinfo,v 1.52 2017/01/28 10:14:15 morr Exp $
-SHA1 (wordpress-4.7.tar.gz) = 1e14144c4db71421dc4ed22f94c3914dfc3b7020
-RMD160 (wordpress-4.7.tar.gz) = 8ffa3dce1b36ef68e8d6d03d2dc3d733529509fa
-SHA512 (wordpress-4.7.tar.gz) = 5bbdce5215dc5debc57e00376a94c9035f63d64d20aeb947e973a4dbe1803d262aa85ce27118ddbb3fadaf956ec90974bc76654149102a88c4b1e867740db4ca
-Size (wordpress-4.7.tar.gz) = 7993186 bytes
+SHA1 (wordpress-4.7.2.tar.gz) = 7b687f1af589c337124e6247229af209ec1d52c3
+RMD160 (wordpress-4.7.2.tar.gz) = 94d2c79636652913bdf3b4c7058003b6d5b3f7f2
+SHA512 (wordpress-4.7.2.tar.gz) = 610a820cf2eea39a60100515f68e95a7194a4e20df9c8158111b1978d5bc7c606dd2b7adf2f4019e9108a136e12eb2db7ae5ed75681cec23ffb901f8cc7fb83a
+Size (wordpress-4.7.2.tar.gz) = 7997959 bytes