From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.0.9) Gecko/20061219 Fedora/1.5.0.9-1.fc6 Firefox/1.5.0.9 pango-text Description of problem: Some vulnerabilities have been reported in Wordpress, which can be exploited by malicious users to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service), and by malicious people to gain knowledge of sensitive information. 1) The /wp-admin/user-edit.php script does not correctly restrict access to the metadata of users. This can be exploited to list certain metadata information by passing the ID of a user in the "userid" parameter. 2) Input passed to various fields (e.g. the "first name" field in the profile page) is not properly sanitised before being unserialised. This can be exploited to cause a DoS by entering specially crafted strings. 3) Input passed to unspecified parameters in plugins/wp-db-backup.php is not properly sanitsed. This can be exploited to read arbitrary files via directory traversal attacks. The vulnerabilities have been reported in versions prior to 2.0.5. Solution: Update to version 2.0.5. Version-Release number of selected component (if applicable): wordpress-2.0.4-3.fc5 and later (-4.fc6) How reproducible: Didn't try Steps to Reproduce: 1. 2. 3. Actual Results: Expected Results: Additional info: CVE-2006-5705 (Secunia mirror) CVE-2006-6016 (Secunia mirror) CVE-2006-6017 (Secunia mirror)
Update to 2.0.5
Do you mean to say that this security holes will not be fixed in fc5 and fc6 but first in 4 months when fc7 hits the streets? Then please remove the security flag, so that users know that they are vunerable.
No, the packages in FE5 and FE6 were updated to version 2.0.5 and thus are no longer vulnerable per the description provided.