Your message dated Sun, 25 Jan 2009 16:17:04 +0000
with message-id <e1lr7fu-0004vn...@ries.debian.org>
and subject line Bug#508869: fixed in mediawiki 1:1.12.0-2lenny2
has caused the Debian Bug report #508869,
regarding CVE-2008-5250: several local script injection vulnerabilities in 
MediaWiki
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
508869: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508869
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mediawiki
Version: 1:1.7
Severity: grave
Tags: security patch

Hi,

The following CVE (Common Vulnerabilities & Exposures) id was published for 
mediawiki.

[0]:
> * A local script injection vulnerability affecting Internet Explorer
> clients for all MediaWiki installations with uploads enabled.
> [CVE-2008-5250]
> * A local script injection vulnerability affecting clients with SVG
> scripting capability (such as Firefox 1.5+), for all MediaWiki
> installations with SVG uploads enabled. [CVE-2008-5250]

A patch fixing this and other issues can be found at [0].

If you fix the vulnerability please also make sure to include the CVE id in 
the changelog entry.

[0]http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5250
     http://security-tracker.debian.net/tracker/CVE-2008-5250

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
Source: mediawiki
Source-Version: 1:1.12.0-2lenny2

We believe that the bug you reported is fixed in the latest version of
mediawiki, which is due to be installed in the Debian FTP archive:

mediawiki-math_1.12.0-2lenny2_amd64.deb
  to pool/main/m/mediawiki/mediawiki-math_1.12.0-2lenny2_amd64.deb
mediawiki_1.12.0-2lenny2.diff.gz
  to pool/main/m/mediawiki/mediawiki_1.12.0-2lenny2.diff.gz
mediawiki_1.12.0-2lenny2.dsc
  to pool/main/m/mediawiki/mediawiki_1.12.0-2lenny2.dsc
mediawiki_1.12.0-2lenny2_all.deb
  to pool/main/m/mediawiki/mediawiki_1.12.0-2lenny2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 508...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <giuse...@iuculano.it> (supplier of updated mediawiki package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 18 Jan 2009 11:54:02 +0100
Source: mediawiki
Binary: mediawiki mediawiki-math
Architecture: source all amd64
Version: 1:1.12.0-2lenny2
Distribution: testing-security
Urgency: high
Maintainer: Mediawiki Maintenance Team 
<pkg-mediawiki-de...@lists.alioth.debian.org>
Changed-By: Giuseppe Iuculano <giuse...@iuculano.it>
Description: 
 mediawiki  - website engine for collaborative work
 mediawiki-math - math rendering plugin for MediaWiki
Closes: 508869 508870
Changes: 
 mediawiki (1:1.12.0-2lenny2) testing-security; urgency=high
 .
   * Security update, NMU to fix fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
   * debian/patches/CVE-2008-5249_CVE-2008-5250_CVE-2008-5252.patch:
     - Fixed output escaping for reporting of non-MediaWiki exceptions.
       Potential XSS if an extension throws one of these with user input.
     - Avoid fatal error in profileinfo.php when not configured.
     - Fixed CSRF vulnerability in Special:Import. Fixed input validation in
       transwiki import feature.
     - Add a .htaccess to deleted images directory for additional protection
       against exposure of deleted files with known SHA-1 hashes on default
       installations.
     - Fixed XSS vulnerability for Internet Explorer clients, via file uploads
       which are interpreted by IE as HTML.
     - Fixed XSS vulnerability for clients with SVG scripting, on wikis where 
SVG
       uploads are enabled. Firefox 1.5+ is affected.
     - Avoid streaming uploaded files to the user via index.php. This allows
       security-conscious users to serve uploaded files via a different domain,
       and thus client-side scripts executed from that domain cannot access the
       login cookies. Affects Special:Undelete, img_auth.php and thumb.php.
     - When streaming files via index.php, use the MIME type detected from the
       file extension, not from the data. This reduces the XSS attack surface.
     - Blacklist redirects via Special:Filepath. Such redirects exacerbate any
       XSS vulnerabilities involving uploads of files containing scripts.
   Closes: #508869, #508870
Checksums-Sha1: 
 512bf6e8fca53d500bf05830f63f56c8d294f50c 1256 mediawiki_1.12.0-2lenny2.dsc
 e88ac10275b63597d0f458d410bacebfb4e4011c 44723 mediawiki_1.12.0-2lenny2.diff.gz
 001451c718bd81e0919f22629cb576c070cc84a7 7221734 
mediawiki_1.12.0-2lenny2_all.deb
 1b548cb4268b1a40a6450d9eb2872a693defbd97 156542 
mediawiki-math_1.12.0-2lenny2_amd64.deb
Checksums-Sha256: 
 ebbb4e60c1a3e9a654497e8d4e52ebdbac798db2bc9bd6203a5f3cd5e7db52eb 1256 
mediawiki_1.12.0-2lenny2.dsc
 ead873972b16a61e4ed3bf8a3f2a91322322b8ac0215ad5e1ba79e92690c4b9a 44723 
mediawiki_1.12.0-2lenny2.diff.gz
 af01d0399306308938d8d3b02bc193d4544e56f92db5f60dec11b51c472a3211 7221734 
mediawiki_1.12.0-2lenny2_all.deb
 6b833ad770dae6f5bd05fcfd3ad36d6aa721decae8b09a6a26fb4d42d07d305e 156542 
mediawiki-math_1.12.0-2lenny2_amd64.deb
Files: 
 591bf4d91a70412b0d39eec68db0d54b 1256 web optional mediawiki_1.12.0-2lenny2.dsc
 e6458248327c0bba19c8424eae912d13 44723 web optional 
mediawiki_1.12.0-2lenny2.diff.gz
 b0870767c2a8e11928f1064eb17bef43 7221734 web optional 
mediawiki_1.12.0-2lenny2_all.deb
 6cbeb87e190429648e95cadb0fcc0b40 156542 web optional 
mediawiki-math_1.12.0-2lenny2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkl8UzwACgkQHYflSXNkfP/dKwCdHTXstaOGpEedqa836BfUxKFS
vFYAni3GafeEy8gPtsa/adkMir9yaKu1
=O3Hj
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to