[SECURITY] Fedora 21 Update: mediawiki-1.24.1-1.fc21

updates at fedoraproject.org updates at fedoraproject.org
Mon Dec 29 10:00:01 UTC 2014


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-17278
2014-12-19 17:11:17
--------------------------------------------------------------------------------

Name        : mediawiki
Product     : Fedora 21
Version     : 1.24.1
Release     : 1.fc21
URL         : http://www.mediawiki.org/
Summary     : A wiki engine
Description :
MediaWiki is the software used for Wikipedia and the other Wikimedia
Foundation websites. Compared to other wikis, it has an excellent
range of features and support for high-traffic websites using multiple
servers

This package supports wiki farms. Read the instructions for creating wiki
instances under /usr/share/doc/mediawiki/README.RPM.
Remember to remove the config dir after completing the configuration.

--------------------------------------------------------------------------------
Update Information:

* (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.\r\n* (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.\r\n* (bug T74222) The original patch for T74222 was reverted as unnecessary.\r\n* Fixed a couple of entries in RELEASE-NOTES-1.24.\r\n* (bug T76168) OutputPage: Add accessors for some protected properties.\r\n* (bug T74834) Make 1.24 branch directly installable under PostgreSQL.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Michael Cronenworth <mike at cchtml.com> - 1.24.1-1
- Update to 1.24.1
- (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.
- (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.
- (bug T74222) The original patch for T74222 was reverted as unnecessary.
- Fixed a couple of entries in RELEASE-NOTES-1.24.
- (bug T76168) OutputPage: Add accessors for some protected properties.
- (bug T74834) Make 1.24 branch directly installable under PostgreSQL.
* Fri Nov 28 2014 Michael Cronenworth <mike at cchtml.com> - 1.24.0-1
- Update to 1.24.0
- Release notes: http://www.mediawiki.org/wiki/Release_notes/1.24
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1175828 - mediawiki: multiple vulnerabilities
        https://bugzilla.redhat.com/show_bug.cgi?id=1175828
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update mediawiki' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list