From owner-svn-ports-head@freebsd.org Sun Nov 19 02:38:31 2017 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 49E2EDE655C; Sun, 19 Nov 2017 02:38:31 +0000 (UTC) (envelope-from wen@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 23D2E66A78; Sun, 19 Nov 2017 02:38:31 +0000 (UTC) (envelope-from wen@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id vAJ2cUo7070363; Sun, 19 Nov 2017 02:38:30 GMT (envelope-from wen@FreeBSD.org) Received: (from wen@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id vAJ2cUss070360; Sun, 19 Nov 2017 02:38:30 GMT (envelope-from wen@FreeBSD.org) Message-Id: <201711190238.vAJ2cUss070360@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: wen set sender to wen@FreeBSD.org using -f From: Wen Heping Date: Sun, 19 Nov 2017 02:38:30 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r454471 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: wen X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 454471 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 Nov 2017 02:38:31 -0000 Author: wen Date: Sun Nov 19 02:38:29 2017 New Revision: 454471 URL: https://svnweb.freebsd.org/changeset/ports/454471 Log: - Document vulnerability in www/mediawiki127, www/mediawiki128 and www/mediawiki129. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Nov 19 01:06:20 2017 (r454470) +++ head/security/vuxml/vuln.xml Sun Nov 19 02:38:29 2017 (r454471) @@ -58,6 +58,58 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + mediawiki -- multiple vulnerabilities + + + mediawiki127 + 1.27.3 + + + mediawiki128 + 1.28.2 + + + mediawiki129 + 1.29.1 + + + + +

mediawiki reports:

+
+

security fixes:

+

T128209: Reflected File Download from api.php. Reported by Abdullah Hussam.

+

T165846: BotPasswords doesn't throttle login attempts.

+

T134100: On private wikis, login form shouldn't distinguish between login failure due to bad username and bad password.

+

T178451: XSS when $wgShowExceptionDetails = false and browser sends non-standard url escaping.

+

T176247: It's possible to mangle HTML via raw message parameter expansion.

+

T125163: id attribute on headlines allow raw.

+

T124404: language converter can be tricked into replacing text inside tags by adding a lot of junk after the rule definition.

+

T119158: Language converter: unsafe attribute injection via glossary rules.

+

T180488: api.log contains passwords in plaintext wasn't correctly fixed.

+

T180231: composer.json has require-dev versions of PHPUnit with known security issues. Reported by Tom Hutchison.

+
+ +
+ + CVE-2017-8808 + CVE-2017-8809 + CVE-2017-8810 + CVE-2017-8811 + CVE-2017-8812 + CVE-2017-8814 + CVE-2017-8815 + CVE-2017-0361 + CVE-2017-9841 + https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html + + + 2017-11-14 + 2017-11-19 + +
+ Flash Player -- multiple vulnerabilities