Change logs for mediawiki source package in Maverick

  • mediawiki (1:1.15.5-1) unstable; urgency=high
    
      [ Thorsten Glaser ]
      * debian/patches/suppress_warnings.patch: new, suppress warnings
        about session_start() being called twice also in the PHP error
        log, not just MediaWiki’s, for example run from FusionForge
    
      [ Jonathan Wiltshire ]
      * New upstream security release:
        - correctly set caching headers to prevent private data leakage
             (closes: #590660, LP: #610782)
        - fix XSS vulnerability in profileinfo.php
             (closes: #590669, LP: #610819)
     -- Jonathan Wiltshire <email address hidden>   Wed, 28 Jul 2010 12:23:04 +0100
  • mediawiki (1:1.15.4-2) unstable; urgency=low
    
      [ Thorsten Glaser ]
      * debian/control: add Vcs-SVN and Vcs-Browser
    
      [ Jonathan Wiltshire ]
      * debian/source/format: Switch to source format 3.0 (quilt)
      * debian/rules: Drop CDBS quilt logic
      * debian_specific_config.patch: Don't just redefine MW_INSTALL_PATH,
        remove the original definition (LP: #406358)
      * debian/README.source: document use of quilt and format 3.0 (quilt)
      * New patch backup_documentation.patch improves documentation of
        maintenance/dumpBackup.php (closes: #572355)
      * Standards version 3.9.0 (no changes)
     -- Andreas Wenning <email address hidden>   Tue,  13 Jul 2010 18:49:14 +0100
  • mediawiki (1:1.15.4-1) unstable; urgency=high
    
      [ Jonathan Wiltshire ]
      * New upstream security release (closes: #585918).
      * CVE-2010-1647:
        Fix a cross-site scripting (XSS) vulnerability which allows
        remote attackers to inject arbitrary web script or HTML via crafted
        Cascading Style Sheets (CSS) strings that are processed as script by
        Internet Explorer.
      * CVE-2010-1648:
        Fix a cross-site request forgery (CSRF) vulnerability in the login interface
        which allows remote attackers to hijack the authentication of users for
        requests that (1) create accounts or (2) reset passwords, related to the
        Special:Userlogin form.
    
      [ Romain Beauxis ]
      * Put debian's package version in declared version.
        Should help sysadmins to keep track of installed 
        versions, in particular with regard to security
        updates. 
      * Added Jonathan Wiltshire to uploaders.
      * Do not clan math dir if it does not exist (for instance
        when running clean from SVN).
    
    mediawiki (1:1.15.3-1) unstable; urgency=high
    
      * New upstream release.
      * Fixes security issue:
      "MediaWiki was found to be vulnerable to login CSRF. An attacker who
       controls a user account on the target wiki can force the victim to log
       in as the attacker, via a script on an external website. If the wiki is
       configured to allow user scripts, say with "$wgAllowUserJs = true" in
       LocalSettings.php, then the attacker can proceed to mount a
      phishing-style attack against the victim to obtain their password."
    
    mediawiki (1:1.15.2-1) unstable; urgency=high
    
      * New upstream release.
      * Fixes security issue:
      "Two security issues were discovered:
    
       A CSS validation issue was discovered which allows editors to display
       external images in wiki pages. This is a privacy concern on public
       wikis, since a malicious user may link to an image on a server they
       control, which would allow that attacker to gather IP addresses and
       other information from users of the public wiki. All sites running
       publicly-editable MediaWiki installations are advised to upgrade. All
       versions of MediaWiki (prior to this one) are affected.
    
       A data leakage vulnerability was discovered in thumb.php which affects
       wikis which restrict access to private files using img_auth.php, or
       some similar scheme. All versions of MediaWiki since 1.5 are affected."
      * Updated standards.
      * Removed section about upgrading from mediawiki1.x packages
        in README.Debian since they do not exist in any supported distribution
        anymore.
      * Switched php5-gd and imagemagick in Suggests. Closes: #542008
      * Backported patch from revision 51083 to fix a bug with invalid titles.
      Closes: #537134
      * Backported patch from revision 61090 to add a unique guid per RSS
        feed element.
      Closes: #383130
      * Refreshed patches. 
     -- Andreas Wenning <email address hidden>   Tue,  22 Jun 2010 17:58:17 +0100
  • mediawiki (1:1.15.1-1ubuntu3) maverick; urgency=low
    
      * SECURITY UPDATE: A CSRF vulnerability was discovered in our login
        interface. Although regular logins are protected as of 1.15.3, it was
        discovered that the account creation and password reset features were not
        protected from CSRF. This could lead to unauthorised access to private
        wikis. (LP: #586773)
        - debian/patches/CSRF-Special-Userlogin-no-CVE_rev-66991.patch
        - patch from upstream SVN rev. 66991
        - http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
        - https://bugzilla.wikimedia.org/show_bug.cgi?id=23371
      * SECURITY UPDATE: Noncompliant CSS parsing behaviour in Internet Explorer
        allows attackers to construct CSS strings which are treated as safe by
        previous versions of MediaWiki, but are decoded to unsafe strings by
        Internet Explorer. (LP: #586773)
        - debian/patches/XSS-IE-no-CVE_rev-66992.patch
        - patch from upstream SVN rev. 66992
        - http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
        - https://bugzilla.wikimedia.org/show_bug.cgi?id=23687
     -- Andreas Wenning <email address hidden>   Mon, 31 May 2010 00:49:46 +0200
  • mediawiki (1:1.15.1-1ubuntu2) lucid; urgency=low
    
      * SECURITY UPDATE: MediaWiki was found to be vulnerable to login CSRF. An
        attacker who controls a user account on the target wiki can force the
        victim to login as the attacker, via a script on an external website.
        IMPORTANT: Fix includes a breaking change to the API login action. Any
        clients using it will need to be updated. (LP: #557159)
        - debian/patches/CSRF-no-CVE_rev-64680.patch
        - patch from upstream SVN rev. 64680
        - http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html
        - https://bugzilla.wikimedia.org/show_bug.cgi?id=23076
     -- Andreas Wenning <email address hidden>   Wed, 07 Apr 2010 11:46:10 +0200