lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Y3VNh-0003YG-Fi@pool.mine.nu>
Date: Tue, 23 Dec 2014 20:44:33 +0100
From: Sebastien Delafond <seb@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3110-1] mediawiki security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3110-1                   security@...ian.org
http://www.debian.org/security/                        Sebastien Delafond
December 23, 2014                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mediawiki
Debian Bug     : 773654

A flaw was discovered in mediawiki, a wiki engine: thumb.php outputs
wikitext messages as raw HTML, potentially leading to cross-site
scripting (XSS).

For the stable distribution (wheezy), this problem has been fixed in
version 1.19.20+dfsg-0+deb7u3; this version additionally fixes a
regression introduced in the previous release, DSA-3100-1.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version
1:1.19.20+dfsg-2.2.

We recommend that you upgrade your mediawiki packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJUmcYhAAoJEBC+iYPz1Z1kqe8IALyGTstRTOeLniYSiQ83vSz5
s6LnuVbqgmL6ENetNX4ChFOwVhQcyVWZpFSAwI1EDzoXI4aP53hTwcYmMnJIAo21
bi9z7eAM7Y/uoBW5BjVkQJoJeTD0iFI/tlDpdwBCWtf9nP+VkSgsyoBdPaBp54sP
hktHI1e8eF6haebOYq06jX8CKqBItFI88Y39yu8N2Kv+HY/4x2Pf4p5YyO8L8bO3
XsDgzFgOXnHM01sIZ0yjF9EWqzYQ0NBuTfmqPQTgOixLMhgemJ724PjWggSawaEF
DEZlV0KgQnoKSHxEIduP5iiMSiBUo5CWkLg+O+GOR9U8jkryccEZ5b1I/cWmP1k=
=2OOK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ