http://wordpress.org/news/2014/04/wordpress-3-8-2/ WordPress 3.8.2 is now available. This is an important security release for all previous versions and we strongly encourage you to update your sites immediately. This releases fixes a weakness that could let an attacker force their way into your site by forging authentication cookies. This was discovered and fixed by Jon Cave of the WordPress security team. It also contains a fix to prevent a user with the Contributor role from improperly publishing posts. Reported by edik. This release also fixes nine bugs and contains three other security hardening changes: Pass along additional information when processing pingbacks to help hosts identify potentially abusive requests. Fix a low-impact SQL injection by trusted users. Reported by Tom Adams of dxw. Prevent possible cross-domain scripting through Plupload, the third-party library WordPress uses for uploading files. Reported by Szymon Gruszecki.
I think the two CVEs assigned are CVE-2014-0165 and CVE-2014-0166: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744018 http://codex.wordpress.org/Version_3.8.2
*** Bug 507250 has been marked as a duplicate of this bug. ***
Minor update/fix: http://wordpress.org/news/2014/04/wordpress-3-8-3/
3.8.3 in three and 3.7 was never included. Package not stable: closing noglsa
CVE-2014-0166 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0166): The wp_validate_auth_cookie function in wp-includes/pluggable.php in WordPress before 3.7.2 and 3.8.x before 3.8.2 does not properly determine the validity of authentication cookies, which makes it easier for remote attackers to obtain access via a forged cookie. CVE-2014-0165 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0165): WordPress before 3.7.2 and 3.8.x before 3.8.2 allows remote authenticated users to publish posts by leveraging the Contributor role, related to wp-admin/includes/post.php and wp-admin/includes/class-wp-posts-list-table.php.