You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mediawiki

Sigurnosni nedostaci programskog paketa mediawiki

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5567dd228a
2016-01-02 19:00:53.591195
——————————————————————————–

Name : mediawiki
Product : Fedora 23
Version : 1.26.2
Release : 1.fc23
URL : http://www.mediawiki.org/
Summary : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

Changes since 1.26.1 * (bug T121892) Various special pages resulted in fatal
errors. Changes since 1.26.0 * (bug T117899) SECURITY: $wgArticlePath can no
longer be set to relative paths that do not begin with a slash. This enabled
trivial XSS attacks. Configuration values such as “http://my.wiki.com/wiki/$1”
are fine, as are “/wiki/$1”. A value such as “$1” or “wiki/$1” is not and will
now throw an error * (bug T119309) SECURITY: Use hash_compare() for edit token
comparison * (bug T118032) SECURITY: Don’t allow cURL to interpret POST
parameters starting with ‘@’ as file uploads * (bug T115522) SECURITY: Passwords
generated by User::randomPassword() can no longer be shorter than
$wgMinimalPasswordLength * (bug T97897) SECURITY: Improve IP parsing and
trimming. Previous behavior could result in improper blocks being issued * (bug
T109724) SECURITY: Special:MyPage, Special:MyTalk, Special:MyContributions and
related pages no longer use HTTP redirects and are now redirected by MediaWiki *
Fixed ConfigException in ExpandTemplates due to AlwaysUseTidy. * Fixed stray
literal \n in Special:Search. * Fix issue that breaks HHVM Repo Authorative
mode. * (bug T120267) Work around APCu memory corruption bug
——————————————————————————–
References:

[ 1 ] Bug #1293847 – mediawiki: multiple flaws fixed in 1.26.1, 1.25.4, 1.24.5, and 1.23.12
https://bugzilla.redhat.com/show_bug.cgi?id=1293847
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-56543978e8
2016-01-07 23:40:26.815788
——————————————————————————–

Name        : mediawiki
Product     : Fedora 22
Version     : 1.26.2
Release     : 1.fc22
URL         : http://www.mediawiki.org/
Summary     : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

——————————————————————————–
Update Information:

Changes since 1.26.1  * (bug T121892) Various special pages resulted in fatal
errors.  Changes since 1.26.0  * (bug T117899) SECURITY: $wgArticlePath can no
longer be set to relative paths that do not begin with a slash. This enabled
trivial XSS attacks. Configuration values such as “http://my.wiki.com/wiki/$1”
are fine, as are “/wiki/$1”. A value such as “$1” or “wiki/$1” is not and will
now throw an error * (bug T119309) SECURITY: Use hash_compare() for edit token
comparison * (bug T118032) SECURITY: Don’t allow cURL to interpret POST
parameters starting with ‘@’ as file uploads * (bug T115522) SECURITY: Passwords
generated by User::randomPassword() can no longer be shorter than
$wgMinimalPasswordLength * (bug T97897) SECURITY: Improve IP parsing and
trimming. Previous behavior could result in improper blocks being issued * (bug
T109724) SECURITY: Special:MyPage, Special:MyTalk, Special:MyContributions and
related pages no longer use HTTP redirects and are now redirected by MediaWiki *
Fixed ConfigException in ExpandTemplates due to AlwaysUseTidy. * Fixed stray
literal \n in Special:Search. * Fix issue that breaks HHVM Repo Authorative
mode. * (bug T120267) Work around APCu memory corruption bug
——————————————————————————–
References:

  [ 1 ] Bug #1293847 – mediawiki: multiple flaws fixed in 1.26.1, 1.25.4, 1.24.5, and 1.23.12
        https://bugzilla.redhat.com/show_bug.cgi?id=1293847
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mediawiki’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2016-01-0006-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ganeti

Otkriveni su sigurnosni nedostaci u programskom paketu ganeti. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem usluge i otkrivanje DRBD...

Close