Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Bernd Zeimetz <bernd <at> bzed.de>
Subject: Bug#672695: wordpress: no sane way for security updates in stable releases
Newsgroups: gmane.linux.debian.devel.general
Date: Saturday 12th May 2012 21:45:17 UTC (over 5 years ago)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package: wordpress
Severity: grave
Version: 3.3.2+dfsg-1

[CC-in [email protected] to discuss this]

Hi,

although I think the wordpress maintainer are doing all they can do to keep
wordpress in a good shape in Debian, I do not think that it is possible to
support a stable version with security fixes as we expect it for our
releases.
The last security update shows that the wordpress upstream is not
interested
in helping by documenting their patches or shipping proper point-releases
to
at least some versions.

Being forced to upgrade to a new major version by a stable security support
is
nothing we should force our users to. Debian stable is known for (usually)
painfree updates and bugfixes only, not for shipping completely new
versions
with a forced migration. Therefore - in my opinion - we should not ship
wordpress in Wheezy, at least not until upstream handles such issues in a
sane
way.


Cheers,

Bernd



- -------- Original Message --------
Subject: [SECURITY] [DSA 2670-1] wordpress security update
Resent-Date: Fri, 11 May 2012 20:41:44 +0000 (UTC)
Resent-From: [email protected]
Date: Fri, 11 May 2012 22:41:14 +0200
From: Yves-Alexis Perez 
Reply-To: [email protected]
To: [email protected]

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -
-------------------------------------------------------------------------
Debian Security Advisory DSA-2670-1                   [email protected]
http://www.debian.org/security/ 
                       Yves-Alexis Perez
May 11, 2012                           http://www.debian.org/security/faq
- -
-------------------------------------------------------------------------

Package        : wordpress
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2011-3122 CVE-2011-3125 CVE-2011-3126 CVE-2011-3127
                 CVE-2011-3128 CVE-2011-3129 CVE-2011-3130 CVE-2011-4956
                 CVE-2011-4957 CVE-2012-2399 CVE-2012-2400 CVE-2012-2401
                 CVE-2012-2402 CVE-2012-2403 CVE-2012-2404
Debian Bug     : 670124

Several vulnerabilities were identified in Wordpress, a web blogging
tool.  As the CVEs were allocated from releases announcements and
specific fixes are usually not identified, it has been decided to
upgrade the Wordpress package to the latest upstream version instead
of backporting the patches.

This means extra care should be taken when upgrading, especially when
using third-party plugins or themes, since compatibility may have been
impacted along the way.  We recommend that users check their install
before doing the upgrade.

For the stable distribution (squeeze), those problems have been fixed in
version 3.3.2+dfsg-1~squeeze1.

For the testing distribution (wheezy) and the unstable distribution
(sid), those problems have been fixed in version 3.3.2+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPrXyJAAoJEL97/wQC1SS+4EcH/1nAhgTx17pMJF7JbWFNG2ZY
/xSD6v4MDj3pLiZrntRx4c3y+Kbx91QKBN6KgqDxyHjDLoZgoNVVGwyozGjS2VBn
m2OwnjzLUJVqd77R+mUj5h3yEVS1d4O+VcYRcpugPTaD17d90rlPGL2HkZXnQAk1
OjOKGns+yiapuLpcHmNz5cjwvJxaNe355aZlwSUjFWumqtGjQcgyJeKy1XGW0s2o
h9YnLXGRNwtihXz0P+5qx7Qwcri3PXLn1Uapp2RSJStkNfiRjSJoqUkb5wqvhT7x
O6GhUWShBF6pZ11uvOySY2yU5jPOQDufSUn6T4R5CL4hYJ6Bif6iqkHznPubHeE=
=M38G
- -----END PGP SIGNATURE-----


- -- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact
[email protected]
Archive: http://lists.debian.org/[email protected]

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=UM+T
-----END PGP SIGNATURE-----
 
CD: 3ms