Gentoo Archives: gentoo-announce

From: Kristian Fiskerstrand <k_f@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201510-05 ] MediaWiki: Multiple vulnerabilities
Date: Sat, 31 Oct 2015 15:21:31
Message-Id: 5634DB7B.6020408@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201510-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MediaWiki: Multiple vulnerabilities
9 Date: October 31, 2015
10 Bugs: #545944, #557844
11 ID: 201510-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in MediaWiki, the worst of
19 which may allow remote attackers to cause a Denial of Service.
20
21 Background
22 ==========
23
24 MediaWiki is a collaborative editing software used by large projects
25 such as Wikipedia.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-apps/mediawiki < 1.25.2 >= 1.25.2
34 *>= 1.24.3
35 *>= 1.23.10
36
37 Description
38 ===========
39
40 Multiple vulnerabilities have been discovered in MediaWiki. Please
41 review the CVE identifiers referenced below for details.
42
43 Impact
44 ======
45
46 A remote attacker may be able to create a Denial of Service condition,
47 obtain sensitive information, bypass security restrictions, and inject
48 arbitrary web script or HTML.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All MediaWiki 1.25 users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.25.2"
62
63 All MediaWiki 1.24 users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.24.3"
67
68 All MediaWiki 1.23 users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.23.10"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2015-2931
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931
78 [ 2 ] CVE-2015-2932
79 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932
80 [ 3 ] CVE-2015-2933
81 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933
82 [ 4 ] CVE-2015-2934
83 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934
84 [ 5 ] CVE-2015-2935
85 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935
86 [ 6 ] CVE-2015-2936
87 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936
88 [ 7 ] CVE-2015-2937
89 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937
90 [ 8 ] CVE-2015-2938
91 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938
92 [ 9 ] CVE-2015-2939
93 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939
94 [ 10 ] CVE-2015-2940
95 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940
96 [ 11 ] CVE-2015-2941
97 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941
98 [ 12 ] CVE-2015-2942
99 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942
100 [ 13 ] CVE-2015-6728
101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728
102 [ 14 ] CVE-2015-6729
103 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729
104 [ 15 ] CVE-2015-6730
105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730
106 [ 16 ] CVE-2015-6731
107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731
108 [ 17 ] CVE-2015-6732
109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732
110 [ 18 ] CVE-2015-6733
111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733
112 [ 19 ] CVE-2015-6734
113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734
114 [ 20 ] CVE-2015-6735
115 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735
116 [ 21 ] CVE-2015-6736
117 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736
118 [ 22 ] CVE-2015-6737
119 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737
120
121 Availability
122 ============
123
124 This GLSA and any updates to it are available for viewing at
125 the Gentoo Security Website:
126
127 https://security.gentoo.org/glsa/201510-05
128
129 Concerns?
130 =========
131
132 Security is a primary focus of Gentoo Linux and ensuring the
133 confidentiality and security of our users' machines is of utmost
134 importance to us. Any security concerns should be addressed to
135 security@g.o or alternatively, you may file a bug at
136 https://bugs.gentoo.org.
137
138 License
139 =======
140
141 Copyright 2015 Gentoo Foundation, Inc; referenced text
142 belongs to its owner(s).
143
144 The contents of this document are licensed under the
145 Creative Commons - Attribution / Share Alike license.
146
147 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature