| Summary: | mediawiki new security issues fixed upstream in 1.23.12 (CVE-2015-862[2-8]) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/669157/ | ||
| Whiteboard: | has_procedure advisory MGA5-32-OK | ||
| Source RPM: | mediawiki-1.23.11-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-12-21 21:38:35 CET
David Walser
2015-12-21 21:38:43 CET
Whiteboard:
(none) =>
has_procedure Working fine on our production wiki at work, Mageia 5 i586. Whiteboard:
has_procedure =>
has_procedure MGA5-32-OK CVE assignments: http://openwall.com/lists/oss-security/2015/12/23/7 Advisory: ======================== Updated mediawiki packages fix security vulnerabilities: In MediaWiki before 1.23.11, an XSS vector exists when MediaWiki is configured with a non-standard configuration, from wikitext when $wgArticlePath='$1' (CVE-2015-8622). In MediaWiki before 1.23.11, tokens were being compared as strings, which could allow a timing attack (CVE-2015-8623, CVE-2015-8624). In MediaWiki before 1.23.11, parameters passed to the curl library were not sanitized, which could cause curl to upload files from the webserver to an attacker when POST variable starts with '@' (CVE-2015-8625). In MediaWiki before 1.23.11, the password reset token could be shorter than the minimum required password length (CVE-2015-8626). In MediaWiki before 1.23.11, blocking IP addresses with zero-padded octets resulted in a failure to block the IP address (CVE-2015-8627). In MediaWiki before 1.23.11, a combination of Special:MyPage redirects and pagecounts allows an external site to know the wikipedia login of an user (CVE-2015-8628). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8628 https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html http://openwall.com/lists/oss-security/2015/12/23/7 Summary:
mediawiki new security issues fixed upstream in 1.23.12 =>
mediawiki new security issues fixed upstream in 1.23.12 (CVE-2015-862[2-8]) Whoops, this is 1.23.12. Advisory: ======================== Updated mediawiki packages fix security vulnerabilities: In MediaWiki before 1.23.12, an XSS vector exists when MediaWiki is configured with a non-standard configuration, from wikitext when $wgArticlePath='$1' (CVE-2015-8622). In MediaWiki before 1.23.12, tokens were being compared as strings, which could allow a timing attack (CVE-2015-8623, CVE-2015-8624). In MediaWiki before 1.23.12, parameters passed to the curl library were not sanitized, which could cause curl to upload files from the webserver to an attacker when POST variable starts with '@' (CVE-2015-8625). In MediaWiki before 1.23.12, the password reset token could be shorter than the minimum required password length (CVE-2015-8626). In MediaWiki before 1.23.12, blocking IP addresses with zero-padded octets resulted in a failure to block the IP address (CVE-2015-8627). In MediaWiki before 1.23.12, a combination of Special:MyPage redirects and pagecounts allows an external site to know the wikipedia login of an user (CVE-2015-8628). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8624 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8628 https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html http://openwall.com/lists/oss-security/2015/12/23/7 Validating. Advisory from comment 3 uploaded. Please push to 5 updates. Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0486.html Status:
NEW =>
RESOLVED
David Walser
2015-12-24 19:42:07 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/669157/ |