Bug 16990 - mediawiki new security issues fixed upstream in 1.23.11 (CVE-2015-800[1-5])
Summary: mediawiki new security issues fixed upstream in 1.23.11 (CVE-2015-800[1-5])
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/662906/
Whiteboard: has_procedure advisory MGA5-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-10-20 13:38 CEST by David Walser
Modified: 2015-11-03 20:48 CET (History)
2 users (show)

See Also:
Source RPM: mediawiki-1.23.10-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-10-20 13:38:32 CEST
Upstream has announced version 1.23.11 on October 16:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html

CVEs have been requested:
http://openwall.com/lists/oss-security/2015/10/19/8

Updated packages uploaded for Mageia 5 and Cauldron.

Advisory to come later one CVEs are assigned.  For now, see the upstream announcement.

Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Mediawiki

Updated packages in core/updates_testing:
========================
mediawiki-1.23.11-1.mga5
mediawiki-mysql-1.23.11-1.mga5
mediawiki-pgsql-1.23.11-1.mga5
mediawiki-sqlite-1.23.11-1.mga5

from mediawiki-1.23.11-1.mga5.src.rpm

Reproducible: 

Steps to Reproduce:
David Walser 2015-10-20 13:38:40 CEST

Whiteboard: (none) => has_procedure

Comment 1 David Walser 2015-10-20 13:55:40 CEST
Working fine on our production Wiki at work, Mageia 5 i586.

Whiteboard: has_procedure => has_procedure MGA5-32-OK

Comment 2 Lewis Smith 2015-10-26 21:28:37 CET
Testing Mag5 x64 with PostgreSQL database.
Getting that working was some pain, not because it was difficult (it was easy), but finding the necessary information; I added relevant notes to the wiki page:
 https://wiki.mageia.org/en/QA_procedure:Mediawiki

BEFORE update:
Installed from normal repos:
 mediawiki-1.23.10-1.mga5
 mediawiki-mysql-1.23.10-1.mga5
 mediawiki-pgsql-1.23.10-1.mga5
(The Mysql addition got pulled in anyway with MediaWiki itself).
Used it just enough to see that it worked.

AFTER update to:
 mediawiki-1.23.11-1.mga5
 mediawiki-mysql-1.23.11-1.mga5
 mediawiki-pgsql-1.23.11-1.mga5
No problems en route. Confirmed that it still seems to function OK.

CC: (none) => lewyssmith
Whiteboard: has_procedure MGA5-32-OK => has_procedure MGA5-32-OK MGA5-64-OK

Comment 3 David Walser 2015-10-29 21:57:47 CET
CVE-2015-8001 through CVE-2015-8009 assigned:
http://openwall.com/lists/oss-security/2015/10/29/14

Advisory to come soon.

Summary: mediawiki new security issues fixed upstream in 1.23.11 => mediawiki new security issues fixed upstream in 1.23.11 (CVE-2015-800[1-9])

Comment 4 David Walser 2015-10-29 22:38:40 CET
CVE-2015-8006 through CVE-2015-8009 were for non-bundled extensions.

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.11, the API failed to correctly stop adding new
chunks to the upload when the reported size was exceeded, allowing a
malicious user to upload add an infinite number of chunks for a single file
upload (CVE-2015-8001).

In MediaWiki before 1.23.11, a malicious user could upload chunks of 1 byte
for very large files, potentially creating a very large number of files on
the server's filesystem (CVE-2015-8002).

In MediaWiki before 1.23.11, it is not possible to throttle file uploads,
or in other words, rate limit them (CVE-2015-8003).

In MediaWiki before 1.23.11, a missing authorization check when removing
suppression from a revision allowed users with the 'viewsuppressed' user
right but not the appropriate 'suppressrevision' user right to unsuppress
revisions (CVE-2015-8004).

In MediaWiki before 1.23.11, thumbnails of PNG files generated with
ImageMagick contained the local file path in the image (CVE-2015-8005).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8004
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8005
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
http://openwall.com/lists/oss-security/2015/10/29/14

Summary: mediawiki new security issues fixed upstream in 1.23.11 (CVE-2015-800[1-9]) => mediawiki new security issues fixed upstream in 1.23.11 (CVE-2015-800[1-5])

claire robinson 2015-11-02 12:51:09 CET

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 5 claire robinson 2015-11-02 16:56:49 CET
Advisory uploaded.

Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK => has_procedure advisory MGA5-32-OK MGA5-64-OK

Comment 6 Mageia Robot 2015-11-02 21:22:21 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0421.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-11-03 20:48:28 CET

URL: (none) => http://lwn.net/Vulnerabilities/662906/


Note You need to log in before you can comment on or make changes to this bug.