Debian: DSA-2891-2: mediawiki regression update

    Date31 Mar 2014
    CategoryDebian
    46
    Posted ByLinuxSecurity Advisories
    In the Mediawiki update issued as DSA 2891-1, a few files were missing from the package. This update corrects that problem. For reference, the original advisory text follows.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2891-2                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Thijs Kinkhorst
    March 31, 2014                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : mediawiki, mediawiki-extensions
    CVE ID         : CVE-2013-2031 CVE-2013-4567 CVE-2013-4568 CVE-2013-4572 
                     CVE-2013-6452 CVE-2013-6453 CVE-2013-6454 CVE-2013-6472
                     CVE-2014-1610
    Debian Bug     : 729629 706601 742857 742857
    
    In the Mediawiki update issued as DSA 2891-1, a few files were missing
    from the package. This update corrects that problem. For reference, the
    original advisory text follows.
    
    Several vulnerabilities were discovered in MediaWiki, a wiki engine.
    The Common Vulnerabilities and Exposures project describers the followin
    issues:
    
    CVE-2013-2031
    
        Cross-site scripting attack via valid UTF-7 encoded sequences
        in a SVG file.
    
    CVE-2013-4567 & CVE-2013-4568
    
        Kevin Israel (Wikipedia user PleaseStand) reported two ways
        to inject Javascript due to an incomplete blacklist in the
        CSS sanitizer function.
    
    CVE-2013-4572
    
        MediaWiki and the CentralNotice extension were incorrectly setting
        cache headers when a user was autocreated, causing the user's
        session cookies to be cached, and returned to other users.
    
    CVE-2013-6452
    
        Chris from RationalWiki reported that SVG files could be
        uploaded that include external stylesheets, which could lead to
        XSS when an XSL was used to include JavaScript.
    
    CVE-2013-6453
    
        MediaWiki's SVG sanitization could be bypassed when the XML was
        considered invalid.
    
    CVE-2013-6454
    
        MediaWiki's CSS sanitization did not filter -o-link attributes,
        which could be used to execute JavaScript in Opera 12.
    
    CVE-2013-6472
    
        MediaWiki displayed some information about deleted pages in
        the log API, enhanced RecentChanges, and user watchlists.
    
    CVE-2014-1610
    
        A remote code execution vulnerability existed if file upload
        support for DjVu (natively handled) or PDF files (in
        combination with the PdfHandler extension) was enabled.
        Neither file type is enabled by default in MediaWiki.
    
    (ID assignment pending)
    
        Cross site request forgery in login form: an attacker could login
        a victim as the attacker.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 1.19.14+dfsg-0+deb7u1 of the mediawiki package and 3.5~deb7u1
    of the mediawiki-extensions package.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 1:1.19.14+dfsg-1 of the mediawiki package and 3.5 of the
    mediawiki-extensions package.
    
    We recommend that you upgrade your mediawiki packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"6","type":"x","order":"1","pct":54.55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":27.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":18.18,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.