-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA-2022-1 security@debian.org http://www.debian.org/security/ Nico Golde March 23th, 2010 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : mediawiki Vulnerability : several Problem type : remote Debian-specific: no Debian bug : none CVE ID : none assigned yet Several vulnerabilities have been discovered in mediawiki, a web-based wiki engine. The following issues have been identified: Insufficient input sanitization in the CSS validation code allows editors to display external images in wiki pages. This can be a privacy concern on public wikis as it allows attackers to gather IP addresses and other information by linking these images to a web server under their control. Insufficient permission checks have been found in thump.php which can lead to disclosure of image files that are restricted to certain users (e.g. with img_auth.php). For the stable distribution (lenny), this problem has been fixed in version 1.12.0-2lenny4. For the testing distribution (squeeze), this problem has been fixed in version 1:1.15.2-1. For the unstable distribution (sid), this problem has been fixed in version 1:1.15.2-1. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki_1.12.0-2lenny4.dsc Size/MD5 checksum: 1549 cdd8466f627db0d230059bea9dc3bffa http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki_1.12.0.orig.tar.gz Size/MD5 checksum: 7188806 117a1360f440883a51f0ebca32906ea0 http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki_1.12.0-2lenny4.diff.gz Size/MD5 checksum: 61443 fe024a07a1555b8aa813183b98de41da Architecture independent packages: http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki_1.12.0-2lenny4_all.deb Size/MD5 checksum: 7231304 ec3604e69ac212e506df83c93e8fec14 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_alpha.deb Size/MD5 checksum: 49794 92ea80eb2c975d2fa01e48385467eacd amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_amd64.deb Size/MD5 checksum: 156990 4a889dd13d45f38b3594a2dd47e9b59e arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_arm.deb Size/MD5 checksum: 49258 93033e2a83ec4436b07648a20f53ff60 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_armel.deb Size/MD5 checksum: 49226 2814b384dc142da907fa80ac1af1d32a hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_hppa.deb Size/MD5 checksum: 49774 29bfc18a66159684703604a192bc654a i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_i386.deb Size/MD5 checksum: 138776 109b418d062e4b954b98386ac36240d7 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_ia64.deb Size/MD5 checksum: 49762 4eabbe35adb52e9b3c27ac3cebac3126 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_mipsel.deb Size/MD5 checksum: 49772 243c3c339a86ea1bbca7fa58192fd364 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_powerpc.deb Size/MD5 checksum: 162814 82c66b11b70c174cc3b08e36cb4430be s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_s390.deb Size/MD5 checksum: 49246 7ffe72a079284372ae24c49e55b6170b sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mediawiki/mediawiki-math_1.12.0-2lenny4_sparc.deb Size/MD5 checksum: 158134 d96cefd805d0ced4b6477c244ebf2e06 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkupIh8ACgkQHYflSXNkfP/utgCeMKGe5lOkkx4gJPPtl1RbvMoH TNcAoJzn58S8XoSkxYSvB7P422MZE+mY =nb7B -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/