Both Wordpress and Prosody packages for Debian has been updated again:
[DSA 2895-2] prosody regression update
[DSA 2901-3] wordpress regression update
[DSA 2895-2] prosody regression update
[DSA 2901-3] wordpress regression update
[DSA 2895-2] prosody regression update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2895-2 security@debian.org
http://www.debian.org/security/ Luciano Bello
April 21, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : prosody
CVE ID : CVE-2014-2744 CVE-2014-2745
Debian Bug : 743836
The update for prosody in DSA 2895 caused a regression when a client
logins with the compression functionality activated. This update corrects
that problem. For reference, the original advisory text follows.
A denial-of-service vulnerability has been reported in Prosody, a XMPP
server. If compression is enabled, an attacker might send highly-com-
pressed XML elements (attack known as "zip bomb") over XMPP streams and
consume all the resources of the server.
For the stable distribution (wheezy), this problem has been fixed in
version 0.8.2-4+deb7u2 of prosody.
We recommend that you upgrade your prosody package.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2901-3] wordpress regression update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2901-3 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
April 21, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wordpress
CVE ID : CVE-2014-0165 CVE-2014-0166
Debian Bug : 744018
The update of wordpress in DSA-2901-2 introduced a wrong versioned
dependency on libjs-cropper, making the package uninstallable in the
oldstable distribution (squeeze). This update corrects that problem.
For reference the original advisory text follows.
Several vulnerabilities were discovered in Wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following problems:
CVE-2014-0165
A user with a contributor role, using a specially crafted
request, can publish posts, which is reserved for users of the
next-higher role.
CVE-2014-0166
Jon Cave of the WordPress security team discovered that the
wp_validate_auth_cookie function in wp-includes/pluggable.php does
not properly determine the validity of authentication cookies,
allowing a remote attacker to obtain access via a forged cookie.
For the oldstable distribution (squeeze), this problem has been fixed
in version 3.6.1+dfsg-1~deb6u4.
We recommend that you upgrade your wordpress packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/