You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mediawiki

Sigurnosni nedostaci programskog paketa mediawiki

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3344
2014-03-03 02:13:56
——————————————————————————–

Name : mediawiki
Product : Fedora 19
Version : 1.21.6
Release : 1.fc19
URL : http://www.mediawiki.org/
Summary : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki-1.21.6/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

* (bug 60771) SECURITY: Disallow uploading SVG files using non-whitelisted namespaces. Also disallow iframe elements. User will get an error including the namespace name if they use a non-whitelisted namespace.
* (bug 61346) SECURITY: Make token comparison use constant time. It seems like our token comparison would be vulnerable to timing attacks. This will take constant time.
* (bug 61362) SECURITY: API: Don’t find links in the middle of api.php links.

——————————————————————————–
ChangeLog:

* Sat Mar 1 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.6-1
– Update to 1.21.6
– (bug 60771) SECURITY: Disallow uploading SVG files using non-whitelisted namespaces. Also disallow iframe elements. User will get an error including the namespace name if they use a non- whitelisted namespace.
– (bug 61346) SECURITY: Make token comparison use constant time. It seems like our token comparison would be vulnerable to timing attacks. This will take constant time.
– (bug 61362) SECURITY: API: Don’t find links in the middle of api.php links.
* Tue Jan 28 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.5-1
– Update to 1.21.5
– (bug 60339) (CVE-2014-1610) SECURITY: Reported RCE in djvu thumbnailing
* Tue Jan 14 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.4-1
– Security update to 1.19.10
– (bug 57550) (CVE-2013-6452) SECURITY: Disallow stylesheets in SVG Uploads
– (bug 58088) (CVE-2013-6451) SECURITY: Don’t normalize U+FF3C to \ in CSS Checks
– (bug 58472) (CVE-2013-6454) SECURITY: Disallow -o-link in styles
– (bug 58553) (CVE-2013-6453) SECURITY: Return error on invalid XML for SVG Uploads
– (bug 58699) (CVE-2013-6472) SECURITY: Fix RevDel log entry information leaks
* Tue Nov 19 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.3-1
– New upstream release.
* Sat Oct 5 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.2-2
– Packaging fixes. (#1006110, #1007377)
* Thu Sep 5 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.2-1
– New upstream release.
* Sat Jul 27 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.1-4
– Update mw-createinstance
* Wed Jul 10 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.1-3
– Fix Obsoletes
* Tue Jul 9 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.1-2
– Provide/Obsolete now included extensions (#967811)
——————————————————————————–
References:

[ 1 ] Bug #1071135 – CVE-2014-2242 mediawiki: cross-site scripting flaw when handling SVG images
https://bugzilla.redhat.com/show_bug.cgi?id=1071135
[ 2 ] Bug #1071136 – CVE-2014-2243 mediawiki: timing attack on token
https://bugzilla.redhat.com/show_bug.cgi?id=1071136
[ 3 ] Bug #1071139 – CVE-2014-2244 mediawiki: HTML injection
https://bugzilla.redhat.com/show_bug.cgi?id=1071139
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3338
2014-03-03 02:13:42
——————————————————————————–

Name : mediawiki
Product : Fedora 20
Version : 1.21.6
Release : 1.fc20
URL : http://www.mediawiki.org/
Summary : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

* (bug 60771) SECURITY: Disallow uploading SVG files using non-whitelisted namespaces. Also disallow iframe elements. User will get an error including the namespace name if they use a non-whitelisted namespace.
* (bug 61346) SECURITY: Make token comparison use constant time. It seems like our token comparison would be vulnerable to timing attacks. This will take constant time.
* (bug 61362) SECURITY: API: Don’t find links in the middle of api.php links.

——————————————————————————–
ChangeLog:

* Sat Mar 1 2014 Michael Cronenworth <mike@cchtml.com> – 1.21.6-1
– Update to 1.21.6
– (bug 60771) SECURITY: Disallow uploading SVG files using non-whitelisted namespaces. Also disallow iframe elements. User will get an error including the namespace name if they use a non- whitelisted namespace.
– (bug 61346) SECURITY: Make token comparison use constant time. It seems like our token comparison would be vulnerable to timing attacks. This will take constant time.
– (bug 61362) SECURITY: API: Don’t find links in the middle of api.php links.
* Tue Jan 28 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.5-1
– Update to 1.21.5
– (bug 60339) (CVE-2014-1610) SECURITY: Reported RCE in djvu thumbnailing
* Tue Jan 14 2014 Patrick Uiterwijk <puiterwijk@redhat.com> – 1.21.4-1
– Security update to 1.21.4
– (bug 57550) (CVE-2013-6452) SECURITY: Disallow stylesheets in SVG Uploads
– (bug 58088) (CVE-2013-6451) SECURITY: Don’t normalize U+FF3C to \ in CSS Checks
– (bug 58472) (CVE-2013-6454) SECURITY: Disallow -o-link in styles
– (bug 58553) (CVE-2013-6453) SECURITY: Return error on invalid XML for SVG Uploads
– (bug 58699) (CVE-2013-6472) SECURITY: Fix RevDel log entry information leaks
* Tue Nov 19 2013 Michael Cronenworth <mike@cchtml.com> – 1.21.3-1
– New upstream release.
——————————————————————————–
References:

[ 1 ] Bug #1071135 – CVE-2014-2242 mediawiki: cross-site scripting flaw when handling SVG images
https://bugzilla.redhat.com/show_bug.cgi?id=1071135
[ 2 ] Bug #1071136 – CVE-2014-2243 mediawiki: timing attack on token
https://bugzilla.redhat.com/show_bug.cgi?id=1071136
[ 3 ] Bug #1071139 – CVE-2014-2244 mediawiki: HTML injection
https://bugzilla.redhat.com/show_bug.cgi?id=1071139
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-03-0005-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa wireshark

Otkriveni su sigurnosni nedostaci u programskom paketu wireshark za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close