Bug 17379 - mediawiki new security issues fixed upstream in 1.23.12 (CVE-2015-862[2-8])
Summary: mediawiki new security issues fixed upstream in 1.23.12 (CVE-2015-862[2-8])
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/669157/
Whiteboard: has_procedure advisory MGA5-32-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-12-21 21:38 CET by David Walser
Modified: 2015-12-24 19:42 CET (History)
1 user (show)

See Also:
Source RPM: mediawiki-1.23.11-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-12-21 21:38:35 CET
Upstream has announced version 1.23.12 on December 18:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html

CVEs have been requested:
http://openwall.com/lists/oss-security/2015/12/21/8

Updated packages uploaded for Mageia 5 and Cauldron.

Advisory to come later one CVEs are assigned.  For now, see the upstream announcement.

Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Mediawiki

Updated packages in core/updates_testing:
========================
mediawiki-1.23.12-1.mga5
mediawiki-mysql-1.23.12-1.mga5
mediawiki-pgsql-1.23.12-1.mga5
mediawiki-sqlite-1.23.12-1.mga5

from mediawiki-1.23.12-1.mga5.src.rpm

Reproducible: 

Steps to Reproduce:
David Walser 2015-12-21 21:38:43 CET

Whiteboard: (none) => has_procedure

Comment 1 David Walser 2015-12-21 22:55:48 CET
Working fine on our production wiki at work, Mageia 5 i586.

Whiteboard: has_procedure => has_procedure MGA5-32-OK

Comment 2 David Walser 2015-12-23 22:11:02 CET
CVE assignments:
http://openwall.com/lists/oss-security/2015/12/23/7

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.11, an XSS vector exists when MediaWiki is
configured with a non-standard configuration, from wikitext when
$wgArticlePath='$1' (CVE-2015-8622).

In MediaWiki before 1.23.11, tokens were being compared as strings, which
could allow a timing attack (CVE-2015-8623, CVE-2015-8624).

In MediaWiki before 1.23.11, parameters passed to the curl library were not
sanitized, which could cause curl to upload files from the webserver to an
attacker when POST variable starts with '@' (CVE-2015-8625).

In MediaWiki before 1.23.11, the password reset token could be shorter than
the minimum required password length (CVE-2015-8626).

In MediaWiki before 1.23.11, blocking IP addresses with zero-padded octets
resulted in a failure to block the IP address (CVE-2015-8627).

In MediaWiki before 1.23.11, a combination of Special:MyPage redirects and
pagecounts allows an external site to know the wikipedia login of an user
(CVE-2015-8628).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8627
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8628
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
http://openwall.com/lists/oss-security/2015/12/23/7

Summary: mediawiki new security issues fixed upstream in 1.23.12 => mediawiki new security issues fixed upstream in 1.23.12 (CVE-2015-862[2-8])

Comment 3 David Walser 2015-12-23 22:11:46 CET
Whoops, this is 1.23.12.

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.12, an XSS vector exists when MediaWiki is
configured with a non-standard configuration, from wikitext when
$wgArticlePath='$1' (CVE-2015-8622).

In MediaWiki before 1.23.12, tokens were being compared as strings, which
could allow a timing attack (CVE-2015-8623, CVE-2015-8624).

In MediaWiki before 1.23.12, parameters passed to the curl library were not
sanitized, which could cause curl to upload files from the webserver to an
attacker when POST variable starts with '@' (CVE-2015-8625).

In MediaWiki before 1.23.12, the password reset token could be shorter than
the minimum required password length (CVE-2015-8626).

In MediaWiki before 1.23.12, blocking IP addresses with zero-padded octets
resulted in a failure to block the IP address (CVE-2015-8627).

In MediaWiki before 1.23.12, a combination of Special:MyPage redirects and
pagecounts allows an external site to know the wikipedia login of an user
(CVE-2015-8628).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8627
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8628
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
http://openwall.com/lists/oss-security/2015/12/23/7
Comment 4 claire robinson 2015-12-24 10:29:36 CET
Validating. Advisory from comment 3 uploaded.

Please push to 5 updates. Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA5-32-OK => has_procedure advisory MGA5-32-OK
CC: (none) => sysadmin-bugs

Comment 5 Mageia Robot 2015-12-24 12:09:20 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0486.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-12-24 19:42:07 CET

URL: (none) => http://lwn.net/Vulnerabilities/669157/


Note You need to log in before you can comment on or make changes to this bug.