Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: unblock

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Please unblock package wordpress

Currently Wordpress in Bullseye is 5.6.1 and is vulnerable to CVE-2021-29450
reported in bug #987065

There are really three options here, either
 a) Bullseye gets upgraded to 5.6.3 [1]; or
 b) Bullseye gets 5.6.1 that only has the patch
 c) WordPress in 5.7.1 in Sid is unblocked and put into Bullseye

My preference is to have Bullseye use 5.7.1, i.e. unblock from Sid,
hence this email.

This will make the inevitable security updates easier during the life of 
Bullseye
and will slow down "why is this version so old" emails I'll get.

I was hoping to get 5.7 into Bullseye anyway but missed the freeze.
With this security bug, there needs to be an update, it just comes
down to which one to do.

Patching only the change initially sounds good, but the issue is any
subsequent patches (and there will be security bugs in future) become
very difficult to do. Upstream may also assume a bug is not a bug due to
some previous fix (e.g. a change in 5.6.2 we don't put stops some
future security issue.

The issue of patching future WordPress 5.6.1+ versions is easy to see
by looking at upstreams source repository[2], there are two security
updates here.

So, 768f1d8 looks like a good contender for a PHP8 related problem
which is CVE-2021-29447[3] but where is the fix for CVE-2021-29450 [4]?
It's probably buried in c937087 "Grouped merges for 5.6.3"

This sort of thing happens all the time, its why for example Buster we
track 5.0.x [5] and Buster has 5.0.11 not 5.0.4+something.

[ Reason ]
To fix security bug CVE-2021-29450 [4] and to ensure that subsequent
security issues are properly handled for Bullseye.

[ Impact ]
Bullseye WordPress users will remain vulnerable OR we have to do some
special upload of 5.6.3 OR some patched thing which is almost but not
quite anything tested anywhere.

[ Tests ]
There are two sets of changes here. WordPress 5.7 has been out for
about a month with no reported issues, so its been tested on various
systems out there including my own.

WordPress 5.7.1 is new. Upstream have automated tests, I have run
this version on my on systems and not had any issues.

[ Risks ]
The change from 5.6.1 to 5.7.1 is big, about 20MB of data but that
would include things like minimised and unminimised javascript.

I'm not sure of the mix of upstream WordPress websites between
5.6.x and 5.7.x but I'd expect most track the latest upstream
meaning 5.7.1 would be used *way* more than 5.6.3

Nobody would be using the patched 5.6.1 option before its released.

[ Checklist ]
  [Y] all changes are documented in the d/changelog
  [Y] I reviewed all changes and I approve them
  [N] attach debdiff against the package in testing

[ Other info ]
I can provide the 25M debdiff if required, but I don't think it will be
useful.

1: https://wordpress.org/support/wordpress-version/version-5-6-3/
2: https://github.com/WordPress/WordPress/commits/5.6-branch
3: 
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-rv47-pc52-qrhh
4: 
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pmmh-2f36-wvhq
5: 
https://metadata.ftp-master.debian.org/changelogs//main/w/wordpress/wordpress_5.0.11+dfsg1-0+deb10u1_changelog
unblock wordpress/5.7.1+dfsg1-1


-----BEGIN PGP SIGNATURE-----
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=GwCm
-----END PGP SIGNATURE-----

Reply via email to