Hi Craig,

On Sat, May 02, 2020 at 10:31:24AM +1000, Craig Small wrote:
> This is the analysis of the latest WordPress security bugs.
> Is it awesome upstream already has CVE IDs and (almost) clear patches of
> the fixes? Yes, it is!
> 
> Sid: 5.4
> All vulnerabilities, use upstream 5.4.1
> 
> Bullseye: 5.3.2
> https://github.com/WordPress/wordpress-develop/commit/42cbfc76f87add1853996730c587ea66aa8fdc28
> SVN references: 47633 47634 47635 47636 47637 47638
> https://core.trac.wordpress.org/changeset/47633  Customizer - CVE-2020-11025
> https://core.trac.wordpress.org/changeset/47634 password update -
> CVE-2020-11027
> https://core.trac.wordpress.org/changeset/47635 single post on query -
> CVE-2020-11028
> https://core.trac.wordpress.org/changeset/47636 block editor escape -
> CVE-2020-11030
> https://core.trac.wordpress.org/changeset/47637 escaping around stats -
> CVE-2020-11029
> https://core.trac.wordpress.org/changeset/47638 sanitize file name -
> CVE-2020-11026
> All vulnerable, use aggregated GH commit

Thanks for this btw, and I have synced the security-tracker
information with it now (plus trying to add respective isolated
commits from the git hub repository a swell).

For a respective update in the other branches it makes obviously sense
as you say to use the aggregted commit from GH.

Regards,
Salvatore

Reply via email to