Fedora Linux 8737 Published by

A wordpress security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: wordpress-5.8.4-1.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-4b3079c1be
2022-03-18 19:12:07.465573
--------------------------------------------------------------------------------

Name : wordpress
Product : Fedora 34
Version : 5.8.4
Release : 1.fc34
URL :   http://www.wordpress.org
Summary : Blog tool and publishing platform
Description :
Wordpress is an online publishing / weblog package that makes it very easy,
almost trivial, to get information out to people on the web.

Important information in /usr/share/doc/wordpress/README.fedora

--------------------------------------------------------------------------------
Update Information:

WordPress 5.8.4 Security Release
--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar 11 2022 Remi Collet - 5.8.4-1
- WordPress 5.8.4 Security Release
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2063661 - CVE-2022-25600 Wordpress: Cross-Site Request Forgery (CSRF) vulnerability in WP Google Map plugin
  https://bugzilla.redhat.com/show_bug.cgi?id=2063661
[ 2 ] Bug #2063667 - CVE-2022-25601 wordpress: Reflected Cross-Site Scripting (XSS) in Contact Form X WordPress plugin
  https://bugzilla.redhat.com/show_bug.cgi?id=2063667
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-4b3079c1be' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________