diff -u mediawiki-1.12.0/debian/control mediawiki-1.12.0/debian/control --- mediawiki-1.12.0/debian/control +++ mediawiki-1.12.0/debian/control @@ -1,7 +1,8 @@ Source: mediawiki Section: web Priority: optional -Maintainer: Mediawiki Maintenance Team +Maintainer: Ubuntu MOTU Developers +XSBC-Original-Maintainer: Mediawiki Maintenance Team Uploaders: Romain Beauxis Build-Depends: debhelper (>= 4.2.0), quilt, patchutils (>= 0.2.25), cdbs (>= 0.4.27), ocaml-nox | ocaml, xsltproc, docbook-xml, docbook-xsl, po-debconf Homepage: http://www.mediawiki.org/ diff -u mediawiki-1.12.0/debian/changelog mediawiki-1.12.0/debian/changelog --- mediawiki-1.12.0/debian/changelog +++ mediawiki-1.12.0/debian/changelog @@ -1,3 +1,18 @@ +mediawiki (1:1.12.0-2ubuntu0.1) intrpid-security; urgency=low + + * SECURITY UPDATE: + Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, + and possibly other versions before 1.13.2 allows remote attackers + to inject arbitrary web script or HTML via the useskin parameter + to an unspecified component. (LP: #290015) + - debian/patches/CVE-2008-4408.patch: Address XSS vulnerability. Based on + upstream/Debian patch. + - CVE-2008-4408 + - http://svn.wikimedia.org/viewvc/mediawiki?view=rev&revision=41540 + - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501115 + + -- Iain Lane Mon, 27 Oct 2008 19:27:33 +0000 + mediawiki (1:1.12.0-2) unstable; urgency=low * Fixed postgresql dependency diff -u mediawiki-1.12.0/debian/control.in mediawiki-1.12.0/debian/control.in --- mediawiki-1.12.0/debian/control.in +++ mediawiki-1.12.0/debian/control.in @@ -1,7 +1,8 @@ Source: mediawiki Section: web Priority: optional -Maintainer: Mediawiki Maintenance Team +Maintainer: Ubuntu MOTU Developers +XSBC-Original-Maintainer: Mediawiki Maintenance Team Uploaders: Romain Beauxis Build-Depends: @cdbs@, ocaml-nox | ocaml, xsltproc, docbook-xml, docbook-xsl, po-debconf Homepage: http://www.mediawiki.org/ diff -u mediawiki-1.12.0/debian/patches/series mediawiki-1.12.0/debian/patches/series --- mediawiki-1.12.0/debian/patches/series +++ mediawiki-1.12.0/debian/patches/series @@ -4,0 +5 @@ +CVE-2008-4408.patch only in patch2: unchanged: --- mediawiki-1.12.0.orig/debian/patches/CVE-2008-4408.patch +++ mediawiki-1.12.0/debian/patches/CVE-2008-4408.patch @@ -0,0 +1,15 @@ +Index: mediawiki-1.12.0/includes/SkinTemplate.php +=================================================================== +--- mediawiki-1.12.0.orig/includes/SkinTemplate.php 2008-10-14 15:54:23.000000000 +0200 ++++ mediawiki-1.12.0/includes/SkinTemplate.php 2008-10-14 15:55:32.000000000 +0200 +@@ -1001,9 +1001,7 @@ + # If we use the site's dynamic CSS, throw that in, too + if ( $wgUseSiteCss ) { + $query = "usemsgcache=yes&action=raw&ctype=text/css&smaxage=$wgSquidMaxage"; +- $skinquery = ''; +- if (($us = $wgRequest->getVal('useskin', '')) !== '') +- $skinquery = "&useskin=$us"; ++ $skinquery = "&useskin=" . urlencode( $this->getSkinName() ); + $sitecss .= '@import "' . self::makeNSUrl( 'Common.css', $query, NS_MEDIAWIKI) . '";' . "\n"; + $sitecss .= '@import "' . self::makeNSUrl( ucfirst( $this->skinname ) . '.css', $query, NS_MEDIAWIKI ) . '";' . "\n"; + $sitecss .= '@import "' . self::makeUrl( '-', "action=raw&gen=css$siteargs$skinquery" ) . '";' . "\n";