From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-dev/2013-January/022038.html | 106 ++++++++++++++++++++++++++++ 1 file changed, 106 insertions(+) create mode 100644 zarb-ml/mageia-dev/2013-January/022038.html (limited to 'zarb-ml/mageia-dev/2013-January/022038.html') diff --git a/zarb-ml/mageia-dev/2013-January/022038.html b/zarb-ml/mageia-dev/2013-January/022038.html new file mode 100644 index 000000000..b187e90f5 --- /dev/null +++ b/zarb-ml/mageia-dev/2013-January/022038.html @@ -0,0 +1,106 @@ + + + + [Mageia-dev] Freeze push: wordpress 3.5.1 + + + + + + + + + +

[Mageia-dev] Freeze push: wordpress 3.5.1

+ Anne Nicolas + ennael1 at gmail.com +
+ Fri Jan 25 08:29:41 CET 2013 +

+
+ +
Le 25/01/2013 06:07, FundaWang a écrit :
+> Hello,
+> Could wordpress 3.5.1 be pushed? It addresses the following security issues:
+> * A server-side request forgery vulnerability and remote port scanning using pingbacks. This vulnerability, which could potentially be used to expose information and compromise a site, affects all previous WordPress versions. This was fixed by the WordPress security team. We’d like to thank security researchers Gennady Kovshenin and Ryan Dewhurst for reviewing our work.
+> * Two instances of cross-site scripting via shortcodes and post content. These issues were discovered by Jon Cave of the WordPress security team.
+> * A cross-site scripting vulnerability in the external library Plupload. Thanks to the Moxiecode team for working with us on this, and for releasing Plupload 1.5.5 to address this issue.
+> Regards. 		 	   		
+
+Done
+
+-- 
+Anne
+http://mageia.org
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+

+ +
+More information about the Mageia-dev +mailing list
+ -- cgit v1.2.1