You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mediawiki

Sigurnosni nedostaci programskog paketa mediawiki

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5569
2015-04-05 11:02:50
——————————————————————————–

Name : mediawiki
Product : Fedora 20
Version : 1.23.9
Release : 1.fc20
URL : http://www.mediawiki.org/
Summary : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

Changes since 1.23.8

* (bug T85848, bug T71210) SECURITY: Don’t parse XMP blocks that contain XML entities, to prevent various DoS attacks.
* (bug T85848) SECURITY: Don’t allow directly calling Xml::isWellFormed, to reduce likelihood of DoS.
* (bug T88310) SECURITY: Always expand xml entities when checking SVG’s.
* (bug T73394) SECURITY: Escape > in Html::expandAttributes to prevent XSS.
* (bug T85855) SECURITY: Don’t execute another user’s CSS or JS on preview.
* (bug T85349, bug T85850, bug T86711) SECURITY: Multiple issues fixed in SVG filtering to prevent XSS and protect viewer’s privacy.
* (bug T70087) Fix Special:ActiveUsers page for installations using PostgreSQL.

——————————————————————————–
ChangeLog:

* Wed Apr 1 2015 Michael Cronenworth <mike@cchtml.com> – 1.23.9-1
– Update to 1.23.9
– (bug T85848, bug T71210) SECURITY: Don’t parse XMP blocks that contain XML entities, to prevent various DoS attacks.
– (bug T85848) SECURITY: Don’t allow directly calling Xml::isWellFormed, to reduce likelihood of DoS.
– (bug T88310) SECURITY: Always expand xml entities when checking SVG’s.
– (bug T73394) SECURITY: Escape > in Html::expandAttributes to prevent XSS.
– (bug T85855) SECURITY: Don’t execute another user’s CSS or JS on preview.
– (bug T85349, bug T85850, bug T86711) SECURITY: Multiple issues fixed in SVG filtering to prevent XSS and protect viewer’s privacy.
– (bug T70087) Fix Special:ActiveUsers page for installations using PostgreSQL.
* Thu Dec 18 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.8-1
– Update to 1.23.8
– (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.
– (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.
– (bug T74222) The original patch for T74222 was reverted as unnecessary.
* Fri Nov 28 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.7-1
– Update to 1.23.7
– Release notes: http://www.mediawiki.org/wiki/Release_notes/1.23#MediaWiki_1.23.7
* Mon Nov 3 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.6-1
– Update to 1.23.6
– (bug 67440) Allow classes to be registered properly from installer
– (bug 72274) Job queue not running (HTTP 411) due to missing Content-Length: header
* Thu Oct 2 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.5-1
– Update to 1.23.5
– CVE-2014-7295 (bug 70672) SECURITY: OutputPage: Remove separation of css and js module
allowance.
* Fri Sep 26 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.4-1
– Update to 1.23.4
– (bug 69008) SECURITY: Enhance CSS filtering in SVG files. Filter <style> elements; normalize style
elements and attributes before filtering; add checks for attributes that contain css; add unit tests
for html5sec and reported bugs.
– (bug 65998) Make MySQLi work with non-standard socket.
– (bug 66986) GlobalVarConfig shouldn’t throw exceptions for null-valued config settings.
* Thu Aug 28 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.3-1
– Update to 1.23.3
– (bug 68501) Correctly handle incorrect namespace in cleanupTitles.php.
– (bug 64970) Fix support for blobs on DatabaseOracle::update.
– (bug 66574) Display MediaWiki:Loginprompt on the login page.
– (bug 67870) wfShellExec() cuts off stdout at multiples of 8192 bytes.
– (bug 60629) Handle invalid language code gracefully in
Language::fetchLanguageNames.
– (bug 62017) Restore the number of rows shown on Special:Watchlist.
– Check for boolean false result from database query in SqlBagOStuff.
* Sat Aug 16 2014 Michael Cronenworth <mike@cchtml.com> – 1.23.2-1
– Update to 1.23.2 (long term support branch)
– (bug 68187) SECURITY: Prepend jsonp callback with comment.
– (bug 66608) SECURITY: Fix for XSS issue in bug 66608: Generate the URL used for loading
a new page in Javascript,instead of relying on the URL in the link that has been clicked.
– (bug 65778) SECURITY: Copy prevent-clickjacking between OutputPage and ParserOutput.
– (bug 68313) Preferences: Turn stubthreshold back into a combo box.
– (bug 65214) Fix initSiteStats.php maintenance script.
– (bug 67594) Special:ActiveUsers: Fix to work with PostgreSQL.
* Wed Jun 25 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.11-1
– Update to 1.21.11
– (bug 65839) SECURITY: Prevent external resources in SVG files.
– (bug 66428) MimeMagic: Don’t seek before BOF. This has weird side effects
like only extracting the tail of the file partially or not at all.
* Sat May 31 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.10-1
– Update to 1.21.10
– (bug 65501) SECURITY: Don’t parse usernames as wikitext on Special:PasswordReset.
– (bug 36356) Add space between two feed links.
* Fri Apr 25 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.9-1
– Update to 1.21.9
– (bug 63251) (CVE-2014-2853) SECURITY: Escape sortKey in pageInfo.
– (bug 58640) Fixed a compatibility issue with PCRE 8.34 that caused pages to appear blank or with missing text.
* Fri Mar 28 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.8-1
– Update to 1.21.8
– (bug 62497) SECURITY: Add CSRF token on Special:ChangePassword.
– (bug 62467) Set a title for the context during import on the cli.
* Sat Mar 1 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.6-1
– Update to 1.21.6
– (bug 60771) SECURITY: Disallow uploading SVG files using non-whitelisted namespaces. Also disallow iframe elements. User will get an error including the namespace name if they use a non- whitelisted namespace.
– (bug 61346) SECURITY: Make token comparison use constant time. It seems like our token comparison would be vulnerable to timing attacks. This will take constant time.
– (bug 61362) SECURITY: API: Don’t find links in the middle of api.php links.
* Tue Jan 28 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.5-1
– Update to 1.21.5
– (bug 60339) (CVE-2014-1610) SECURITY: Reported RCE in djvu thumbnailing
* Tue Jan 14 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.4-1
– Security update to 1.21.4
– (bug 57550) (CVE-2013-6452) SECURITY: Disallow stylesheets in SVG Uploads
– (bug 58088) (CVE-2013-6451) SECURITY: Don’t normalize U+FF3C to \ in CSS Checks
– (bug 58472) (CVE-2013-6454) SECURITY: Disallow -o-link in styles
– (bug 58553) (CVE-2013-6453) SECURITY: Return error on invalid XML for SVG Uploads
– (bug 58699) (CVE-2013-6472) SECURITY: Fix RevDel log entry information leaks
* Tue Nov 19 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.3-1
– New upstream release.
——————————————————————————–
References:

[ 1 ] Bug #1208072 – mediawiki: mediawiki: security issues fixed in the 1.24.2, 1.23.9, and 1.19.24 releases
https://bugzilla.redhat.com/show_bug.cgi?id=1208072
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5570
2015-04-05 11:02:52
——————————————————————————–

Name : mediawiki
Product : Fedora 21
Version : 1.24.2
Release : 1.fc21
URL : http://www.mediawiki.org/
Summary : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

Changes since 1.24.1

* (bug T85848, bug T71210) SECURITY: Don’t parse XMP blocks that contain XML entities, to prevent various DoS attacks.
* (bug T85848) SECURITY: Don’t allow directly calling Xml::isWellFormed, to reduce likelihood of DoS.
* (bug T88310) SECURITY: Always expand xml entities when checking SVG’s.
* (bug T73394) SECURITY: Escape > in Html::expandAttributes to prevent XSS.
* (bug T85855) SECURITY: Don’t execute another user’s CSS or JS on preview.
* (bug T64685) SECURITY: Allow setting maximal password length to prevent DoS when using PBKDF2.
* (bug T85349, bug T85850, bug T86711) SECURITY: Multiple issues fixed in SVG filtering to prevent XSS and protect viewer’s privacy.
* Fix case of SpecialAllPages/SpecialAllMessages in SpecialPageFactory to fix loading these special pages when $wgAutoloadAttemptLowercase is false.
* (bug T70087) Fix Special:ActiveUsers page for installations using PostgreSQL.
* (bug T76254) Fix deleting of pages with PostgreSQL. Requires a schema change and running update.php to fix.

——————————————————————————–
ChangeLog:

* Wed Apr 1 2015 Michael Cronenworth <mike@cchtml.com> – 1.24.2-1
– Update to 1.24.2
– (bug T85848, bug T71210) SECURITY: Don’t parse XMP blocks that contain XML entities, to prevent various DoS attacks.
– (bug T85848) SECURITY: Don’t allow directly calling Xml::isWellFormed, to reduce likelihood of DoS.
– (bug T88310) SECURITY: Always expand xml entities when checking SVG’s.
– (bug T73394) SECURITY: Escape > in Html::expandAttributes to prevent XSS.
– (bug T85855) SECURITY: Don’t execute another user’s CSS or JS on preview.
– (bug T64685) SECURITY: Allow setting maximal password length to prevent DoS when using PBKDF2.
– (bug T85349, bug T85850, bug T86711) SECURITY: Multiple issues fixed in SVG filtering to prevent XSS and protect viewer’s privacy.
– Fix case of SpecialAllPages/SpecialAllMessages in SpecialPageFactory to fix loading these special pages when $wgAutoloadAttemptLowercase is false.
– (bug T70087) Fix Special:ActiveUsers page for installations using PostgreSQL.
– (bug T76254) Fix deleting of pages with PostgreSQL. Requires a schema change and running update.php to fix.
* Thu Dec 18 2014 Michael Cronenworth <mike@cchtml.com> – 1.24.1-1
– Update to 1.24.1
– (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.
– (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.
– (bug T74222) The original patch for T74222 was reverted as unnecessary.
– Fixed a couple of entries in RELEASE-NOTES-1.24.
– (bug T76168) OutputPage: Add accessors for some protected properties.
– (bug T74834) Make 1.24 branch directly installable under PostgreSQL.
* Fri Nov 28 2014 Michael Cronenworth <mike@cchtml.com> – 1.24.0-1
– Update to 1.24.0
– Release notes: http://www.mediawiki.org/wiki/Release_notes/1.24
——————————————————————————–
References:

[ 1 ] Bug #1208072 – mediawiki: mediawiki: security issues fixed in the 1.24.2, 1.23.9, and 1.19.24 releases
https://bugzilla.redhat.com/show_bug.cgi?id=1208072
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Top
More in Preporuke
Sigurnosni propust programskog paketa jenkins-matrix-project-plugin

Otkriveni je sigurnosni propust u programskom paketu jenkins-matrix-project-plugin za operacijski sustav Fedora. Otkriveni propust potencijalnim napadačima omogućuje stjecanje povećanih korisničkih...

Close