ALT-BU-2020-4088-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2022-00281
Уязвимость модуля dnf системы управления конфигурациями Ansible, связанная с некорректным подтверждением криптографической подписи данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14365
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
Package alterator-datetime updated to version 4.6.1-alt1 for branch p9 in task 259486.
Closed bugs
Некорректное значение параметра clocksource в /etc/sysconfig/grub2
Closed vulnerabilities
BDU:2021-01718
Уязвимость функции check_output из output.c SUID изолированной программной среды Firejail, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01721
Уязвимость функции check_output из output.c SUID изолированной программной среды Firejail, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07039
Уязвимость компонента img_auth.php программного средства для реализации гипертекстовой среды MediaWik, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-07042
Уязвимость компонента Special:Contributions программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2022-07043
Уязвимость компонента Special:UserRights программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07044
Уязвимость функции mw.message.parse() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2022-07046
Уязвимость расширения OATHAuth программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю обойти существующие ограничения безопасности с помощью атаки методом «грубой силы» (brute force)
Modified: 2024-11-21
CVE-2020-10959
resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page.
Modified: 2024-11-21
CVE-2020-15005
In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34
- https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update
- FEDORA-2020-9c97633708
- FEDORA-2020-9c97633708
- https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html
- https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html
- https://phabricator.wikimedia.org/T248947
- https://phabricator.wikimedia.org/T248947
- DSA-4767
- DSA-4767
Modified: 2024-11-21
CVE-2020-17367
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
- openSUSE-SU-2020:1208
- openSUSE-SU-2020:1208
- https://github.com/netblue30/firejail
- https://github.com/netblue30/firejail
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-45fc8559d5
- FEDORA-2020-45fc8559d5
- GLSA-202101-02
- GLSA-202101-02
- https://www.debian.org/security/2020/dsa-4742
- https://www.debian.org/security/2020/dsa-4742
- DSA-4743
- DSA-4743
Modified: 2024-11-21
CVE-2020-17368
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
- openSUSE-SU-2020:1208
- openSUSE-SU-2020:1208
- https://github.com/netblue30/firejail/
- https://github.com/netblue30/firejail/
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-45fc8559d5
- FEDORA-2020-45fc8559d5
- GLSA-202101-02
- GLSA-202101-02
- DSA-4742
- DSA-4742
- DSA-4743
- DSA-4743
Modified: 2024-11-21
CVE-2020-25812
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25813
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://meta.wikimedia.org/wiki/Special:UserRights
- https://meta.wikimedia.org/wiki/Special:UserRights
Modified: 2024-11-21
CVE-2020-25814
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg
- https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg
Modified: 2024-11-21
CVE-2020-25815
An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25827
An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://phabricator.wikimedia.org/T251661
- https://phabricator.wikimedia.org/T251661
Modified: 2024-11-21
CVE-2020-25828
An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-announce
- https://lists.wikimedia.org/pipermail/mediawiki-announce
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25869
An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://phabricator.wikimedia.org/T260485
- https://phabricator.wikimedia.org/T260485
Modified: 2024-11-21
CVE-2020-26120
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
Modified: 2024-11-21
CVE-2020-26121
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an upload restriction and a create restriction. An attacker cannot leverage this to overwrite anything, but can leverage this to force a wiki to have a page with a disallowed title.
- https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png
- https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png
- https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b
- https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://phabricator.wikimedia.org/T262628
- https://phabricator.wikimedia.org/T262628
Modified: 2024-11-21
CVE-2020-27957
The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
Modified: 2024-11-21
CVE-2020-29002
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
Modified: 2024-11-21
CVE-2020-29003
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
Modified: 2024-11-21
CVE-2020-29004
The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack.
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php
- https://phabricator.wikimedia.org/T262724
- https://phabricator.wikimedia.org/T262724
Modified: 2024-11-21
CVE-2020-29005
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.