Bug 19252 - mediawiki new security issues fixed upstream in 1.23.15
Summary: mediawiki new security issues fixed upstream in 1.23.15
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/698335/
Whiteboard: has_procedure advisory MGA5-32-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-08-26 19:47 CEST by David Walser
Modified: 2016-09-16 11:28 CEST (History)
2 users (show)

See Also:
Source RPM: mediawiki-1.23.14-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-08-26 19:47:15 CEST
Upstream has announced version 1.23.15 on August 23:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html

Updated packages uploaded for Mageia 5 and Cauldron.

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

Check read permission when loading page content in ApiParse (CVE-2016-6331)

Make blocks log users out if $wgBlockDisablesLogin is true (CVE-2016-6332)

Make $wgBlockDisablesLogin also restrict logged in permissions (CVE-2016-6332)

Require login to preview user CSS pages (CVE-2016-6333)

Escape '<' and ']]>' in inline <style> blocks (CVE-2016-6333)

XSS in unclosed internal links (CVE-2016-6334)

API: Generate head items in the context of the given title (CVE-2016-6335)

Do not allow undeleting a revision deleted file if it is the top file
(CVE-2016-6336)

The mediawiki package has been updated to version 1.23.15, which contains
the above fixes.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6332
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6334
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6336
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html
========================

Updated packages in core/updates_testing:
========================
mediawiki-1.23.15-1.mga5
mediawiki-mysql-1.23.15-1.mga5
mediawiki-pgsql-1.23.15-1.mga5
mediawiki-sqlite-1.23.15-1.mga5

from mediawiki-1.23.15-1.mga5.src.rpm
Comment 1 David Walser 2016-08-26 19:47:26 CEST
Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Mediawiki

Whiteboard: (none) => has_procedure

Comment 2 Dave Hodgins 2016-09-07 06:10:54 CEST
Tested on Mageia 5 i586, under virtualbox

Keywords: (none) => validated_update
Whiteboard: has_procedure => has_procedure advisory MGA5-32-OK
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 3 Mageia Robot 2016-09-16 11:28:12 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0305.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.